Analysis
-
max time kernel
235s -
max time network
277s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2022 23:21
Behavioral task
behavioral1
Sample
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe
Resource
win10v2004-20221111-en
General
-
Target
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe
-
Size
3.2MB
-
MD5
4621dbad05492f84c29d4a09ca25cc94
-
SHA1
89afb831e7388f172ae3c9de64e382e3948e75e2
-
SHA256
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd
-
SHA512
a0388ad50c3bb872a453f42883ddd968985611b97a270d13c4fa473df30cfa481f810750d9414ad78413c9dbcf20e78475fa28e3cc174a84971d755b48def4a0
-
SSDEEP
98304:RWNAX6ZAtD8BF41nmx75v0VHlY2FRUrw8ay1eQ8zfIaRIXJpzD:yUAVV2fI8IXr
Malware Config
Signatures
-
Detect Neshta payload 35 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\odt\OFFICE~1.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe family_neshta C:\Windows\svchost.com family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exesvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.compid process 4720 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe 1400 svchost.com 1044 B7310E~1.EXE 2420 svchost.com 4536 B7310E~1.EXE 1820 svchost.com 2328 B7310E~1.EXE 1888 svchost.com 1440 B7310E~1.EXE 4944 svchost.com 2240 B7310E~1.EXE 2176 svchost.com 1832 B7310E~1.EXE 2376 svchost.com 2756 B7310E~1.EXE 3752 svchost.com 3524 B7310E~1.EXE 2336 svchost.com 4196 B7310E~1.EXE 3812 svchost.com 4512 B7310E~1.EXE 1036 svchost.com 1952 B7310E~1.EXE 1444 svchost.com 3920 B7310E~1.EXE 4820 svchost.com 2716 B7310E~1.EXE 932 svchost.com 1256 B7310E~1.EXE 4248 svchost.com 4188 B7310E~1.EXE 1620 svchost.com 548 B7310E~1.EXE 1176 svchost.com 4064 B7310E~1.EXE 4824 svchost.com 4776 B7310E~1.EXE 4220 svchost.com 3516 B7310E~1.EXE 2528 svchost.com 1596 B7310E~1.EXE 4896 svchost.com 1516 B7310E~1.EXE 4320 svchost.com 2020 B7310E~1.EXE 3888 svchost.com 5080 B7310E~1.EXE 4324 svchost.com 3000 B7310E~1.EXE 5072 svchost.com 2656 B7310E~1.EXE 4860 svchost.com 2984 B7310E~1.EXE 4452 svchost.com 4876 B7310E~1.EXE 2848 svchost.com 1640 B7310E~1.EXE 2240 svchost.com 3764 B7310E~1.EXE 2436 svchost.com 448 B7310E~1.EXE 3328 svchost.com 3212 B7310E~1.EXE 1432 svchost.com -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
B7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEb7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exeB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEb7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exeB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000\Control Panel\International\Geo\Nation B7310E~1.EXE -
Drops file in Windows directory 64 IoCs
Processes:
B7310E~1.EXEsvchost.comsvchost.comsvchost.comB7310E~1.EXEB7310E~1.EXEsvchost.comsvchost.comsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEsvchost.comsvchost.comB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEsvchost.comB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEsvchost.comsvchost.comsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comsvchost.comB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comB7310E~1.EXEB7310E~1.EXEsvchost.comsvchost.comsvchost.comB7310E~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comB7310E~1.EXEdescription ioc process File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\directx.sys B7310E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B7310E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B7310E~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
Processes:
B7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEB7310E~1.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE Key created \REGISTRY\USER\S-1-5-21-2971393436-602173351-1645505021-1000_Classes\Local Settings B7310E~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exeb7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exesvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEsvchost.comB7310E~1.EXEdescription pid process target process PID 2936 wrote to memory of 4720 2936 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe PID 2936 wrote to memory of 4720 2936 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe PID 2936 wrote to memory of 4720 2936 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe PID 4720 wrote to memory of 1400 4720 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe svchost.com PID 4720 wrote to memory of 1400 4720 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe svchost.com PID 4720 wrote to memory of 1400 4720 b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe svchost.com PID 1400 wrote to memory of 1044 1400 svchost.com B7310E~1.EXE PID 1400 wrote to memory of 1044 1400 svchost.com B7310E~1.EXE PID 1400 wrote to memory of 1044 1400 svchost.com B7310E~1.EXE PID 1044 wrote to memory of 2420 1044 B7310E~1.EXE svchost.com PID 1044 wrote to memory of 2420 1044 B7310E~1.EXE svchost.com PID 1044 wrote to memory of 2420 1044 B7310E~1.EXE svchost.com PID 2420 wrote to memory of 4536 2420 svchost.com B7310E~1.EXE PID 2420 wrote to memory of 4536 2420 svchost.com B7310E~1.EXE PID 2420 wrote to memory of 4536 2420 svchost.com B7310E~1.EXE PID 4536 wrote to memory of 1820 4536 B7310E~1.EXE svchost.com PID 4536 wrote to memory of 1820 4536 B7310E~1.EXE svchost.com PID 4536 wrote to memory of 1820 4536 B7310E~1.EXE svchost.com PID 1820 wrote to memory of 2328 1820 svchost.com B7310E~1.EXE PID 1820 wrote to memory of 2328 1820 svchost.com B7310E~1.EXE PID 1820 wrote to memory of 2328 1820 svchost.com B7310E~1.EXE PID 2328 wrote to memory of 1888 2328 B7310E~1.EXE svchost.com PID 2328 wrote to memory of 1888 2328 B7310E~1.EXE svchost.com PID 2328 wrote to memory of 1888 2328 B7310E~1.EXE svchost.com PID 1888 wrote to memory of 1440 1888 svchost.com B7310E~1.EXE PID 1888 wrote to memory of 1440 1888 svchost.com B7310E~1.EXE PID 1888 wrote to memory of 1440 1888 svchost.com B7310E~1.EXE PID 1440 wrote to memory of 4944 1440 B7310E~1.EXE svchost.com PID 1440 wrote to memory of 4944 1440 B7310E~1.EXE svchost.com PID 1440 wrote to memory of 4944 1440 B7310E~1.EXE svchost.com PID 4944 wrote to memory of 2240 4944 svchost.com B7310E~1.EXE PID 4944 wrote to memory of 2240 4944 svchost.com B7310E~1.EXE PID 4944 wrote to memory of 2240 4944 svchost.com B7310E~1.EXE PID 2240 wrote to memory of 2176 2240 B7310E~1.EXE svchost.com PID 2240 wrote to memory of 2176 2240 B7310E~1.EXE svchost.com PID 2240 wrote to memory of 2176 2240 B7310E~1.EXE svchost.com PID 2176 wrote to memory of 1832 2176 svchost.com B7310E~1.EXE PID 2176 wrote to memory of 1832 2176 svchost.com B7310E~1.EXE PID 2176 wrote to memory of 1832 2176 svchost.com B7310E~1.EXE PID 1832 wrote to memory of 2376 1832 B7310E~1.EXE svchost.com PID 1832 wrote to memory of 2376 1832 B7310E~1.EXE svchost.com PID 1832 wrote to memory of 2376 1832 B7310E~1.EXE svchost.com PID 2376 wrote to memory of 2756 2376 svchost.com B7310E~1.EXE PID 2376 wrote to memory of 2756 2376 svchost.com B7310E~1.EXE PID 2376 wrote to memory of 2756 2376 svchost.com B7310E~1.EXE PID 2756 wrote to memory of 3752 2756 B7310E~1.EXE svchost.com PID 2756 wrote to memory of 3752 2756 B7310E~1.EXE svchost.com PID 2756 wrote to memory of 3752 2756 B7310E~1.EXE svchost.com PID 3752 wrote to memory of 3524 3752 svchost.com B7310E~1.EXE PID 3752 wrote to memory of 3524 3752 svchost.com B7310E~1.EXE PID 3752 wrote to memory of 3524 3752 svchost.com B7310E~1.EXE PID 3524 wrote to memory of 2336 3524 B7310E~1.EXE svchost.com PID 3524 wrote to memory of 2336 3524 B7310E~1.EXE svchost.com PID 3524 wrote to memory of 2336 3524 B7310E~1.EXE svchost.com PID 2336 wrote to memory of 4196 2336 svchost.com B7310E~1.EXE PID 2336 wrote to memory of 4196 2336 svchost.com B7310E~1.EXE PID 2336 wrote to memory of 4196 2336 svchost.com B7310E~1.EXE PID 4196 wrote to memory of 3812 4196 B7310E~1.EXE svchost.com PID 4196 wrote to memory of 3812 4196 B7310E~1.EXE svchost.com PID 4196 wrote to memory of 3812 4196 B7310E~1.EXE svchost.com PID 3812 wrote to memory of 4512 3812 svchost.com B7310E~1.EXE PID 3812 wrote to memory of 4512 3812 svchost.com B7310E~1.EXE PID 3812 wrote to memory of 4512 3812 svchost.com B7310E~1.EXE PID 4512 wrote to memory of 1036 4512 B7310E~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe"C:\Users\Admin\AppData\Local\Temp\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe"1⤵
- Modifies system executable filetype association
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\b7310ee997506321405426fded5931da6490576668b7d818d2a16c789236affd.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE18⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"21⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"23⤵
- Executes dropped EXE
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE24⤵
- Executes dropped EXE
- Modifies registry class
PID:1952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"25⤵
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE26⤵
- Executes dropped EXE
- Checks computer location settings
PID:3920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"27⤵
- Executes dropped EXE
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE28⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"29⤵
- Executes dropped EXE
PID:932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE30⤵
- Executes dropped EXE
PID:1256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"31⤵
- Executes dropped EXE
PID:4248 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE32⤵
- Executes dropped EXE
PID:4188 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"33⤵
- Executes dropped EXE
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE34⤵
- Executes dropped EXE
PID:548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"35⤵
- Executes dropped EXE
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE36⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE38⤵
- Executes dropped EXE
- Modifies registry class
PID:4776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"39⤵
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE40⤵
- Executes dropped EXE
PID:3516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"41⤵
- Executes dropped EXE
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE42⤵
- Executes dropped EXE
- Modifies registry class
PID:1596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"43⤵
- Executes dropped EXE
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE44⤵
- Executes dropped EXE
- Modifies registry class
PID:1516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"45⤵
- Executes dropped EXE
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE46⤵
- Executes dropped EXE
PID:2020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"47⤵
- Executes dropped EXE
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE48⤵
- Executes dropped EXE
- Checks computer location settings
PID:5080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"49⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE50⤵
- Executes dropped EXE
PID:3000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"51⤵
- Executes dropped EXE
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE52⤵
- Executes dropped EXE
- Checks computer location settings
PID:2656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"53⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE54⤵
- Executes dropped EXE
PID:2984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"55⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE56⤵
- Executes dropped EXE
- Modifies registry class
PID:4876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"57⤵
- Executes dropped EXE
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE58⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"59⤵
- Executes dropped EXE
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
PID:3764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"61⤵
- Executes dropped EXE
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE62⤵
- Executes dropped EXE
PID:448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"63⤵
- Executes dropped EXE
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE64⤵
- Executes dropped EXE
PID:3212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"65⤵
- Executes dropped EXE
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE66⤵PID:1144
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"67⤵PID:5016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE68⤵
- Checks computer location settings
PID:1624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"69⤵
- Drops file in Windows directory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE70⤵
- Drops file in Windows directory
PID:1064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"71⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE72⤵PID:4024
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"73⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE74⤵PID:3820
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"75⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE76⤵PID:4764
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"77⤵PID:4476
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE78⤵
- Modifies registry class
PID:4736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"79⤵PID:4544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE80⤵
- Modifies registry class
PID:4812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"81⤵
- Drops file in Windows directory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE82⤵PID:2632
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"83⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE84⤵
- Modifies registry class
PID:4484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"85⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE86⤵PID:5084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"87⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE88⤵PID:3716
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"89⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE90⤵PID:520
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"91⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE92⤵PID:2008
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"93⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE94⤵
- Checks computer location settings
PID:1880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"95⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE96⤵
- Checks computer location settings
PID:3228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"97⤵
- Drops file in Windows directory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE98⤵PID:3260
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"99⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE100⤵PID:2912
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"101⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE102⤵PID:3552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"103⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE104⤵PID:4996
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"105⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE106⤵
- Drops file in Windows directory
- Modifies registry class
PID:3160 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"107⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE108⤵
- Modifies registry class
PID:1456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"109⤵PID:4208
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE110⤵PID:4328
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"111⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE112⤵PID:1992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"113⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE114⤵PID:3604
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"115⤵
- Drops file in Windows directory
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE116⤵
- Modifies registry class
PID:1936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"117⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE118⤵
- Drops file in Windows directory
PID:4380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"119⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE120⤵
- Drops file in Windows directory
PID:2228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"121⤵
- Drops file in Windows directory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE122⤵PID:1224
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"123⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE124⤵PID:2680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"125⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE126⤵PID:4856
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"127⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE128⤵PID:4800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"129⤵
- Drops file in Windows directory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE130⤵PID:1292
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"131⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE132⤵
- Checks computer location settings
- Modifies registry class
PID:4636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"133⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE134⤵
- Checks computer location settings
PID:3992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"135⤵
- Drops file in Windows directory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE136⤵PID:488
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"137⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE138⤵PID:4968
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"139⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE140⤵PID:1996
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"141⤵PID:4928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE142⤵PID:3432
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"143⤵
- Drops file in Windows directory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE144⤵PID:1304
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"145⤵
- Drops file in Windows directory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE146⤵
- Drops file in Windows directory
- Modifies registry class
PID:4472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"147⤵
- Drops file in Windows directory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE148⤵PID:3700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"149⤵PID:3444
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE150⤵
- Modifies registry class
PID:4896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"151⤵PID:344
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE152⤵PID:4696
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"153⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE154⤵PID:1420
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"155⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE156⤵
- Checks computer location settings
PID:4872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"157⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE158⤵
- Checks computer location settings
PID:4952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"159⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE160⤵
- Modifies registry class
PID:2112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"161⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE162⤵
- Modifies registry class
PID:4704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"163⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE164⤵
- Modifies registry class
PID:1860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"165⤵
- Drops file in Windows directory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE166⤵PID:3856
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"167⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE168⤵PID:2168
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"169⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE170⤵PID:2036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"171⤵PID:4724
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE172⤵
- Modifies registry class
PID:3736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"173⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE174⤵PID:4380
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"175⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE176⤵PID:1144
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"177⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE178⤵
- Checks computer location settings
PID:1744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"179⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE180⤵
- Checks computer location settings
PID:4184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"181⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE182⤵
- Modifies registry class
PID:3632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"183⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE184⤵
- Drops file in Windows directory
PID:4904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"185⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE186⤵
- Modifies registry class
PID:2128 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"187⤵PID:3280
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE188⤵
- Checks computer location settings
PID:3992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"189⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE190⤵
- Drops file in Windows directory
PID:1384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"191⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE192⤵PID:3304
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"193⤵
- Drops file in Windows directory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE194⤵PID:3872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"195⤵
- Drops file in Windows directory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE196⤵PID:3432
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"197⤵PID:3716
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE198⤵PID:4220
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"199⤵PID:520
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE200⤵
- Checks computer location settings
PID:4472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"201⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE202⤵PID:1780
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"203⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE204⤵
- Drops file in Windows directory
PID:4896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"205⤵PID:3424
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE206⤵
- Drops file in Windows directory
PID:4696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"207⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE208⤵PID:4888
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"209⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE210⤵
- Modifies registry class
PID:3000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"211⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE212⤵PID:1360
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"213⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE214⤵PID:1820
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"215⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE216⤵
- Checks computer location settings
PID:2644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"217⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE218⤵PID:4480
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"219⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE220⤵
- Drops file in Windows directory
PID:4760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"221⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE222⤵
- Checks computer location settings
- Modifies registry class
PID:2436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"223⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE224⤵PID:3132
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"225⤵
- Drops file in Windows directory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE226⤵PID:1524
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"227⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE228⤵
- Checks computer location settings
PID:1724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"229⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE230⤵PID:4744
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"231⤵PID:3892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE232⤵
- Checks computer location settings
PID:1744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"233⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE234⤵
- Modifies registry class
PID:2016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"235⤵PID:3908
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE236⤵PID:3632
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"237⤵PID:1436
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE238⤵
- Checks computer location settings
PID:4904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"239⤵PID:3556
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE240⤵PID:3820
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE"241⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B7310E~1.EXE242⤵PID:4736