Analysis
-
max time kernel
154s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-11-2022 23:21
Behavioral task
behavioral1
Sample
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe
Resource
win10v2004-20221111-en
General
-
Target
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe
-
Size
3.2MB
-
MD5
4621dbad05492f84c29d4a09ca25cc94
-
SHA1
89afb831e7388f172ae3c9de64e382e3948e75e2
-
SHA256
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd
-
SHA512
a0388ad50c3bb872a453f42883ddd968985611b97a270d13c4fa473df30cfa481f810750d9414ad78413c9dbcf20e78475fa28e3cc174a84971d755b48def4a0
-
SSDEEP
98304:RWNAX6ZAtD8BF41nmx75v0VHlY2FRUrw8ay1eQ8zfIaRIXJpzD:yUAVV2fI8IXr
Malware Config
Signatures
-
Detect Neshta payload 47 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta \MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exesvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEB7310E~1.EXEsvchost.comsvchost.comB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEsvchost.comsvchost.comsvchost.comB7310E~1.EXEB7310E~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comB7310E~1.EXEsvchost.comsvchost.comB7310E~1.EXEsvchost.compid process 1988 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe 1480 svchost.com 1792 B7310E~1.EXE 944 svchost.com 288 B7310E~1.EXE 572 svchost.com 1072 B7310E~1.EXE 1492 B7310E~1.EXE 688 B7310E~1.EXE 1964 svchost.com 1960 B7310E~1.EXE 1572 svchost.com 1788 B7310E~1.EXE 852 svchost.com 1640 B7310E~1.EXE 872 B7310E~1.EXE 1808 B7310E~1.EXE 1484 B7310E~1.EXE 1676 B7310E~1.EXE 988 svchost.com 548 B7310E~1.EXE 1596 svchost.com 1624 B7310E~1.EXE 1672 svchost.com 1396 B7310E~1.EXE 1520 svchost.com 780 B7310E~1.EXE 1864 B7310E~1.EXE 1376 B7310E~1.EXE 1952 svchost.com 1064 B7310E~1.EXE 1152 svchost.com 1964 B7310E~1.EXE 584 svchost.com 1700 B7310E~1.EXE 1100 B7310E~1.EXE 1468 svchost.com 1668 svchost.com 844 B7310E~1.EXE 1184 B7310E~1.EXE 676 B7310E~1.EXE 296 B7310E~1.EXE 1076 B7310E~1.EXE 1604 svchost.com 948 svchost.com 616 svchost.com 996 B7310E~1.EXE 548 B7310E~1.EXE 1752 B7310E~1.EXE 768 svchost.com 1448 svchost.com 1048 svchost.com 1396 B7310E~1.EXE 628 svchost.com 780 B7310E~1.EXE 1864 B7310E~1.EXE 1376 B7310E~1.EXE 980 svchost.com 1972 B7310E~1.EXE 1080 svchost.com 1152 svchost.com 1300 svchost.com 1784 B7310E~1.EXE 624 svchost.com -
Loads dropped DLL 64 IoCs
Processes:
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exesvchost.comsvchost.comb7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exesvchost.comB7310E~1.EXEsvchost.comsvchost.comsvchost.comB7310E~1.EXEB7310E~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comB7310E~1.EXEsvchost.comsvchost.comsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEB7310E~1.EXEsvchost.comsvchost.comB7310E~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.compid process 1488 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe 1488 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe 1480 svchost.com 1480 svchost.com 944 svchost.com 944 svchost.com 1988 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe 572 svchost.com 572 svchost.com 1492 B7310E~1.EXE 1492 B7310E~1.EXE 1964 svchost.com 1964 svchost.com 1572 svchost.com 1572 svchost.com 852 svchost.com 852 svchost.com 872 B7310E~1.EXE 872 B7310E~1.EXE 1484 B7310E~1.EXE 1484 B7310E~1.EXE 988 svchost.com 988 svchost.com 1596 svchost.com 1596 svchost.com 1672 svchost.com 1672 svchost.com 1520 svchost.com 1520 svchost.com 1864 B7310E~1.EXE 1864 B7310E~1.EXE 1952 svchost.com 1952 svchost.com 1152 svchost.com 1152 svchost.com 584 svchost.com 584 svchost.com 1100 B7310E~1.EXE 1100 B7310E~1.EXE 1668 svchost.com 1668 svchost.com 1184 B7310E~1.EXE 1184 B7310E~1.EXE 296 B7310E~1.EXE 296 B7310E~1.EXE 1604 svchost.com 1604 svchost.com 616 svchost.com 616 svchost.com 548 B7310E~1.EXE 548 B7310E~1.EXE 768 svchost.com 768 svchost.com 1048 svchost.com 1048 svchost.com 628 svchost.com 628 svchost.com 1864 B7310E~1.EXE 1864 B7310E~1.EXE 980 svchost.com 980 svchost.com 1080 svchost.com 1080 svchost.com 1300 svchost.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exeb7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exedescription ioc process File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe -
Drops file in Windows directory 64 IoCs
Processes:
B7310E~1.EXEB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEB7310E~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEB7310E~1.EXEsvchost.comB7310E~1.EXEB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comsvchost.comsvchost.comdescription ioc process File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exeb7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exesvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEdescription pid process target process PID 1488 wrote to memory of 1988 1488 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe PID 1488 wrote to memory of 1988 1488 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe PID 1488 wrote to memory of 1988 1488 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe PID 1488 wrote to memory of 1988 1488 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe PID 1988 wrote to memory of 1480 1988 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe svchost.com PID 1988 wrote to memory of 1480 1988 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe svchost.com PID 1988 wrote to memory of 1480 1988 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe svchost.com PID 1988 wrote to memory of 1480 1988 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe svchost.com PID 1480 wrote to memory of 1792 1480 svchost.com B7310E~1.EXE PID 1480 wrote to memory of 1792 1480 svchost.com B7310E~1.EXE PID 1480 wrote to memory of 1792 1480 svchost.com B7310E~1.EXE PID 1480 wrote to memory of 1792 1480 svchost.com B7310E~1.EXE PID 1792 wrote to memory of 944 1792 B7310E~1.EXE svchost.com PID 1792 wrote to memory of 944 1792 B7310E~1.EXE svchost.com PID 1792 wrote to memory of 944 1792 B7310E~1.EXE svchost.com PID 1792 wrote to memory of 944 1792 B7310E~1.EXE svchost.com PID 944 wrote to memory of 288 944 svchost.com B7310E~1.EXE PID 944 wrote to memory of 288 944 svchost.com B7310E~1.EXE PID 944 wrote to memory of 288 944 svchost.com B7310E~1.EXE PID 944 wrote to memory of 288 944 svchost.com B7310E~1.EXE PID 288 wrote to memory of 572 288 B7310E~1.EXE svchost.com PID 288 wrote to memory of 572 288 B7310E~1.EXE svchost.com PID 288 wrote to memory of 572 288 B7310E~1.EXE svchost.com PID 288 wrote to memory of 572 288 B7310E~1.EXE svchost.com PID 572 wrote to memory of 1072 572 svchost.com B7310E~1.EXE PID 572 wrote to memory of 1072 572 svchost.com B7310E~1.EXE PID 572 wrote to memory of 1072 572 svchost.com B7310E~1.EXE PID 572 wrote to memory of 1072 572 svchost.com B7310E~1.EXE PID 1072 wrote to memory of 1492 1072 B7310E~1.EXE B7310E~1.EXE PID 1072 wrote to memory of 1492 1072 B7310E~1.EXE B7310E~1.EXE PID 1072 wrote to memory of 1492 1072 B7310E~1.EXE B7310E~1.EXE PID 1072 wrote to memory of 1492 1072 B7310E~1.EXE B7310E~1.EXE PID 1492 wrote to memory of 688 1492 B7310E~1.EXE B7310E~1.EXE PID 1492 wrote to memory of 688 1492 B7310E~1.EXE B7310E~1.EXE PID 1492 wrote to memory of 688 1492 B7310E~1.EXE B7310E~1.EXE PID 1492 wrote to memory of 688 1492 B7310E~1.EXE B7310E~1.EXE PID 688 wrote to memory of 1964 688 B7310E~1.EXE svchost.com PID 688 wrote to memory of 1964 688 B7310E~1.EXE svchost.com PID 688 wrote to memory of 1964 688 B7310E~1.EXE svchost.com PID 688 wrote to memory of 1964 688 B7310E~1.EXE svchost.com PID 1964 wrote to memory of 1960 1964 svchost.com B7310E~1.EXE PID 1964 wrote to memory of 1960 1964 svchost.com B7310E~1.EXE PID 1964 wrote to memory of 1960 1964 svchost.com B7310E~1.EXE PID 1964 wrote to memory of 1960 1964 svchost.com B7310E~1.EXE PID 1960 wrote to memory of 1572 1960 B7310E~1.EXE svchost.com PID 1960 wrote to memory of 1572 1960 B7310E~1.EXE svchost.com PID 1960 wrote to memory of 1572 1960 B7310E~1.EXE svchost.com PID 1960 wrote to memory of 1572 1960 B7310E~1.EXE svchost.com PID 1572 wrote to memory of 1788 1572 svchost.com B7310E~1.EXE PID 1572 wrote to memory of 1788 1572 svchost.com B7310E~1.EXE PID 1572 wrote to memory of 1788 1572 svchost.com B7310E~1.EXE PID 1572 wrote to memory of 1788 1572 svchost.com B7310E~1.EXE PID 1788 wrote to memory of 852 1788 B7310E~1.EXE svchost.com PID 1788 wrote to memory of 852 1788 B7310E~1.EXE svchost.com PID 1788 wrote to memory of 852 1788 B7310E~1.EXE svchost.com PID 1788 wrote to memory of 852 1788 B7310E~1.EXE svchost.com PID 852 wrote to memory of 1640 852 svchost.com B7310E~1.EXE PID 852 wrote to memory of 1640 852 svchost.com B7310E~1.EXE PID 852 wrote to memory of 1640 852 svchost.com B7310E~1.EXE PID 852 wrote to memory of 1640 852 svchost.com B7310E~1.EXE PID 1640 wrote to memory of 872 1640 B7310E~1.EXE B7310E~1.EXE PID 1640 wrote to memory of 872 1640 B7310E~1.EXE B7310E~1.EXE PID 1640 wrote to memory of 872 1640 B7310E~1.EXE B7310E~1.EXE PID 1640 wrote to memory of 872 1640 B7310E~1.EXE B7310E~1.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe"C:\Users\Admin\AppData\Local\Temp\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"5⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"7⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE6⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"7⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"2⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"2⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"8⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE1⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"2⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE1⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE3⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE1⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE1⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE1⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"2⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE3⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE1⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE3⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"4⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE1⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE2⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE1⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"2⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE1⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE1⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"2⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE3⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"4⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE1⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE1⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE2⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"3⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE4⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"7⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE8⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"9⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE10⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"11⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE12⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"13⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE14⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"15⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE16⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"17⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE18⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE20⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"21⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE22⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"23⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE24⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"25⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE26⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"27⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE28⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"29⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE30⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"31⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE32⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"33⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE34⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"35⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE36⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"37⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE38⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"39⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE40⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"41⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE42⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"43⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE44⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"45⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE46⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"47⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE48⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"49⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE50⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"51⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE52⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"53⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE54⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"55⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE56⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"57⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE58⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"59⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE60⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"61⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE62⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"63⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE64⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"65⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE66⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"67⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE68⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"69⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE70⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"71⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE72⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"73⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE74⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"75⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE76⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"77⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE78⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"79⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE80⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"81⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE82⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"83⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE84⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"85⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE86⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"87⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE88⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"89⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE90⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"91⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE92⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"93⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE94⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"95⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE96⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"97⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE98⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"99⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE100⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"101⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE102⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"103⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE104⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"105⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE106⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"107⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE108⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"109⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE110⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"111⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE112⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"113⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE114⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"115⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE116⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"117⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE118⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"119⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE120⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"121⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE122⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"123⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE124⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"125⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE126⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"127⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE128⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"129⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE130⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"131⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE132⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"133⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE134⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"135⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE136⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"137⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE138⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"139⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE140⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"141⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE142⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"143⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE144⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"145⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE146⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"147⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE148⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"149⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE150⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"151⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE152⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"153⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE154⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"155⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE156⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"157⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE158⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"159⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE160⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"161⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE162⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"163⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE164⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"165⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE166⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"167⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE168⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"169⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE170⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"171⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE172⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"173⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE174⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"175⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE176⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"177⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE178⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"179⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE180⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"181⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE182⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"183⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE184⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"185⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE186⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"187⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE188⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"189⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE190⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"191⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE192⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"193⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE194⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"195⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE196⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"197⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE198⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"199⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE200⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"201⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE202⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"203⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE204⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"205⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE206⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"207⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE208⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"209⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE210⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"211⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE212⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"213⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE214⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"215⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE216⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"217⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE218⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"219⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE220⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"221⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE222⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"223⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE224⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"225⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE226⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"227⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE228⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"229⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE230⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"231⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE232⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"233⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE234⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"235⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE236⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"237⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE238⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"239⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE240⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"241⤵