Analysis
-
max time kernel
151s -
max time network
39s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19-11-2022 11:22
Behavioral task
behavioral1
Sample
8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe
Resource
win10v2004-20220812-en
General
-
Target
8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe
-
Size
297KB
-
MD5
5050556aa398fc433dbeed4a4661ce20
-
SHA1
8812e8e067ed98473d65dd38146e3878c57c51c1
-
SHA256
8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf
-
SHA512
c6d24690e139724a88b689aad94620257e0e58d51c508a4ab932adb5b9daaace7981746e2e07b3e1658df975d807b67142398b57b6efebdd1162c0dc0a183aa4
-
SSDEEP
6144:89HWcBWsXo8uX0xzH1M3hG69AUeRUqVtyH7xOc6H5c6HcT66vlmr:BUo8xhMoYe3a
Malware Config
Signatures
-
Detect Neshta payload 45 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exesvchost.exe8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exesvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.exesvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEpid process 2036 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe 1576 svchost.exe 1196 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe 1500 svchost.com 1920 8DA574~1.EXE 908 svchost.com 308 8DA574~1.EXE 1628 svchost.exe 560 svchost.com 1668 8DA574~1.EXE 1460 svchost.com 1044 8DA574~1.EXE 1876 svchost.com 1448 8DA574~1.EXE 1632 svchost.com 2044 8DA574~1.EXE 920 svchost.com 1140 8DA574~1.EXE 1968 svchost.com 940 8DA574~1.EXE 1508 svchost.com 1300 8DA574~1.EXE 1716 svchost.com 1500 8DA574~1.EXE 1848 svchost.com 1180 8DA574~1.EXE 1696 svchost.com 1380 8DA574~1.EXE 1084 svchost.com 560 8DA574~1.EXE 820 svchost.com 972 8DA574~1.EXE 1044 svchost.com 1176 8DA574~1.EXE 524 svchost.com 728 8DA574~1.EXE 1528 svchost.com 1512 8DA574~1.EXE 1436 svchost.com 1064 8DA574~1.EXE 1192 svchost.com 1560 8DA574~1.EXE 920 svchost.com 1688 8DA574~1.EXE 1624 svchost.com 1968 8DA574~1.EXE 1080 svchost.com 1772 8DA574~1.EXE 1300 svchost.com 616 8DA574~1.EXE 1500 svchost.com 948 8DA574~1.EXE 1672 svchost.com 1372 8DA574~1.EXE 1636 svchost.com 1936 8DA574~1.EXE 1084 svchost.com 740 8DA574~1.EXE 1368 svchost.com 284 8DA574~1.EXE 1044 svchost.com 1876 8DA574~1.EXE 1640 svchost.com 1056 8DA574~1.EXE -
Loads dropped DLL 64 IoCs
Processes:
8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exesvchost.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.compid process 836 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe 836 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe 1576 svchost.exe 1576 svchost.exe 1500 svchost.com 1500 svchost.com 908 svchost.com 908 svchost.com 560 svchost.com 560 svchost.com 1460 svchost.com 1460 svchost.com 1876 svchost.com 1876 svchost.com 1632 svchost.com 1632 svchost.com 920 svchost.com 920 svchost.com 1968 svchost.com 1968 svchost.com 1508 svchost.com 1508 svchost.com 1716 svchost.com 1716 svchost.com 1848 svchost.com 1848 svchost.com 1696 svchost.com 1696 svchost.com 1084 svchost.com 1084 svchost.com 820 svchost.com 820 svchost.com 1044 svchost.com 1044 svchost.com 524 svchost.com 524 svchost.com 1528 svchost.com 1528 svchost.com 1436 svchost.com 1436 svchost.com 1192 svchost.com 1192 svchost.com 920 svchost.com 920 svchost.com 1624 svchost.com 1624 svchost.com 1080 svchost.com 1080 svchost.com 1300 svchost.com 1300 svchost.com 1500 svchost.com 1500 svchost.com 1672 svchost.com 1672 svchost.com 1636 svchost.com 1636 svchost.com 1084 svchost.com 1084 svchost.com 1368 svchost.com 1368 svchost.com 1044 svchost.com 1044 svchost.com 1640 svchost.com 1640 svchost.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.com8DA574~1.EXE8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXE8DA574~1.EXEsvchost.com8DA574~1.EXE8DA574~1.EXE8DA574~1.EXEsvchost.comsvchost.com8DA574~1.EXE8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com8DA574~1.EXEsvchost.comsvchost.comsvchost.com8DA574~1.EXEsvchost.comsvchost.com8DA574~1.EXEsvchost.comdescription ioc process File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 8DA574~1.EXE File opened for modification C:\Windows\svchost.com 8DA574~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 8DA574~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 8DA574~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys 8DA574~1.EXE File opened for modification C:\Windows\svchost.com 8DA574~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 8DA574~1.EXE File opened for modification C:\Windows\svchost.com 8DA574~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com 8DA574~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 8DA574~1.EXE File opened for modification C:\Windows\directx.sys 8DA574~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 8DA574~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys 8DA574~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys 8DA574~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 8DA574~1.EXE File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exesvchost.exe8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exesvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEsvchost.com8DA574~1.EXEdescription pid process target process PID 836 wrote to memory of 2036 836 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe PID 836 wrote to memory of 2036 836 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe PID 836 wrote to memory of 2036 836 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe PID 836 wrote to memory of 2036 836 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe PID 2036 wrote to memory of 1576 2036 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe svchost.exe PID 2036 wrote to memory of 1576 2036 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe svchost.exe PID 2036 wrote to memory of 1576 2036 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe svchost.exe PID 2036 wrote to memory of 1576 2036 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe svchost.exe PID 1576 wrote to memory of 1196 1576 svchost.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe PID 1576 wrote to memory of 1196 1576 svchost.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe PID 1576 wrote to memory of 1196 1576 svchost.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe PID 1576 wrote to memory of 1196 1576 svchost.exe 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe PID 1196 wrote to memory of 1500 1196 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe svchost.com PID 1196 wrote to memory of 1500 1196 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe svchost.com PID 1196 wrote to memory of 1500 1196 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe svchost.com PID 1196 wrote to memory of 1500 1196 8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe svchost.com PID 1500 wrote to memory of 1920 1500 svchost.com 8DA574~1.EXE PID 1500 wrote to memory of 1920 1500 svchost.com 8DA574~1.EXE PID 1500 wrote to memory of 1920 1500 svchost.com 8DA574~1.EXE PID 1500 wrote to memory of 1920 1500 svchost.com 8DA574~1.EXE PID 1920 wrote to memory of 908 1920 8DA574~1.EXE svchost.com PID 1920 wrote to memory of 908 1920 8DA574~1.EXE svchost.com PID 1920 wrote to memory of 908 1920 8DA574~1.EXE svchost.com PID 1920 wrote to memory of 908 1920 8DA574~1.EXE svchost.com PID 908 wrote to memory of 308 908 svchost.com 8DA574~1.EXE PID 908 wrote to memory of 308 908 svchost.com 8DA574~1.EXE PID 908 wrote to memory of 308 908 svchost.com 8DA574~1.EXE PID 908 wrote to memory of 308 908 svchost.com 8DA574~1.EXE PID 308 wrote to memory of 560 308 8DA574~1.EXE svchost.com PID 308 wrote to memory of 560 308 8DA574~1.EXE svchost.com PID 308 wrote to memory of 560 308 8DA574~1.EXE svchost.com PID 308 wrote to memory of 560 308 8DA574~1.EXE svchost.com PID 560 wrote to memory of 1668 560 svchost.com 8DA574~1.EXE PID 560 wrote to memory of 1668 560 svchost.com 8DA574~1.EXE PID 560 wrote to memory of 1668 560 svchost.com 8DA574~1.EXE PID 560 wrote to memory of 1668 560 svchost.com 8DA574~1.EXE PID 1668 wrote to memory of 1460 1668 8DA574~1.EXE svchost.com PID 1668 wrote to memory of 1460 1668 8DA574~1.EXE svchost.com PID 1668 wrote to memory of 1460 1668 8DA574~1.EXE svchost.com PID 1668 wrote to memory of 1460 1668 8DA574~1.EXE svchost.com PID 1460 wrote to memory of 1044 1460 svchost.com 8DA574~1.EXE PID 1460 wrote to memory of 1044 1460 svchost.com 8DA574~1.EXE PID 1460 wrote to memory of 1044 1460 svchost.com 8DA574~1.EXE PID 1460 wrote to memory of 1044 1460 svchost.com 8DA574~1.EXE PID 1044 wrote to memory of 1876 1044 8DA574~1.EXE svchost.com PID 1044 wrote to memory of 1876 1044 8DA574~1.EXE svchost.com PID 1044 wrote to memory of 1876 1044 8DA574~1.EXE svchost.com PID 1044 wrote to memory of 1876 1044 8DA574~1.EXE svchost.com PID 1876 wrote to memory of 1448 1876 svchost.com 8DA574~1.EXE PID 1876 wrote to memory of 1448 1876 svchost.com 8DA574~1.EXE PID 1876 wrote to memory of 1448 1876 svchost.com 8DA574~1.EXE PID 1876 wrote to memory of 1448 1876 svchost.com 8DA574~1.EXE PID 1448 wrote to memory of 1632 1448 8DA574~1.EXE svchost.com PID 1448 wrote to memory of 1632 1448 8DA574~1.EXE svchost.com PID 1448 wrote to memory of 1632 1448 8DA574~1.EXE svchost.com PID 1448 wrote to memory of 1632 1448 8DA574~1.EXE svchost.com PID 1632 wrote to memory of 2044 1632 svchost.com 8DA574~1.EXE PID 1632 wrote to memory of 2044 1632 svchost.com 8DA574~1.EXE PID 1632 wrote to memory of 2044 1632 svchost.com 8DA574~1.EXE PID 1632 wrote to memory of 2044 1632 svchost.com 8DA574~1.EXE PID 2044 wrote to memory of 920 2044 8DA574~1.EXE svchost.com PID 2044 wrote to memory of 920 2044 8DA574~1.EXE svchost.com PID 2044 wrote to memory of 920 2044 8DA574~1.EXE svchost.com PID 2044 wrote to memory of 920 2044 8DA574~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe"C:\Users\Admin\AppData\Local\Temp\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\8da574a1b81041b9b449d55d53f71d76060072205f6f20bf973130b65d3b24cf.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE18⤵
- Executes dropped EXE
PID:1140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE20⤵
- Executes dropped EXE
PID:940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE22⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE24⤵
- Executes dropped EXE
PID:1500 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE26⤵
- Executes dropped EXE
PID:1180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE28⤵
- Executes dropped EXE
PID:1380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE30⤵
- Executes dropped EXE
PID:560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE32⤵
- Executes dropped EXE
PID:972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE34⤵
- Executes dropped EXE
PID:1176 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE36⤵
- Executes dropped EXE
PID:728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE38⤵
- Executes dropped EXE
PID:1512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE40⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE42⤵
- Executes dropped EXE
PID:1560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE44⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE46⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE48⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE50⤵
- Executes dropped EXE
PID:616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE52⤵
- Executes dropped EXE
PID:948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE54⤵
- Executes dropped EXE
PID:1372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE56⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE58⤵
- Executes dropped EXE
PID:740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE60⤵
- Executes dropped EXE
PID:284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE62⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"63⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE64⤵
- Executes dropped EXE
PID:1056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"65⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE66⤵
- Drops file in Windows directory
PID:2044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"67⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE68⤵PID:1592
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"69⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE70⤵PID:1476
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"71⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE72⤵PID:1804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"73⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE74⤵PID:1624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"75⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE76⤵PID:1680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"77⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE78⤵PID:1984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"79⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE80⤵PID:1736
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"81⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE82⤵PID:864
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"83⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE84⤵
- Drops file in Windows directory
PID:1672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"85⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE86⤵PID:1564
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"87⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE88⤵PID:820
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"89⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE90⤵PID:972
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"91⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE92⤵PID:1536
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"93⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE94⤵PID:1448
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"95⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE96⤵PID:1528
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"97⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE98⤵PID:760
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"99⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE100⤵PID:976
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"101⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE102⤵PID:1532
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"103⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE104⤵PID:1364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"105⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE106⤵PID:324
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"107⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE108⤵PID:1080
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"109⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE110⤵PID:1692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"111⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE112⤵PID:1500
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"113⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE114⤵PID:1180
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"115⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE116⤵PID:1568
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"117⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE118⤵PID:560
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"119⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE120⤵PID:1668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"121⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE122⤵PID:1956
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"123⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE124⤵PID:1176
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"125⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE126⤵PID:1484
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"127⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE128⤵PID:912
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"129⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE130⤵PID:1872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"131⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE132⤵PID:1600
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"133⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE134⤵PID:2036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"135⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE136⤵PID:1260
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"137⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE138⤵PID:1800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"139⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE140⤵PID:1716
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"141⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE142⤵PID:1920
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"143⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE144⤵PID:308
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"145⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE146⤵PID:864
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"147⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE148⤵PID:1980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"149⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE150⤵PID:1460
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"151⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE152⤵PID:1472
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"153⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE154⤵PID:668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"155⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE156⤵PID:1044
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"157⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE158⤵PID:1576
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"159⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE160⤵PID:544
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"161⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE162⤵PID:2012
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"163⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE164⤵PID:1648
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"165⤵
- Drops file in Windows directory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE166⤵PID:1588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"167⤵PID:1328
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
PID:1628
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE1⤵PID:920
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"2⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE3⤵PID:1580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"4⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE5⤵PID:1680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"6⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE7⤵PID:1080
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"8⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE9⤵PID:1612
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"10⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE11⤵PID:828
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"12⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE13⤵PID:1672
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"14⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE15⤵PID:576
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"16⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE17⤵PID:1084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"18⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE19⤵PID:856
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"20⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE21⤵PID:1616
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"22⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE23⤵PID:896
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"24⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE25⤵PID:1436
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"26⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE27⤵PID:1872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"28⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE29⤵PID:1096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"30⤵
- Drops file in Windows directory
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE31⤵PID:984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"32⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE33⤵PID:1476
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"34⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE35⤵PID:608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"36⤵PID:1016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE37⤵PID:1716
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"38⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE39⤵PID:824
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"40⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE41⤵PID:1848
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"42⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE43⤵PID:1048
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"44⤵
- Drops file in Windows directory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE45⤵PID:1104
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"46⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE47⤵PID:1940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"48⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE49⤵PID:1952
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"50⤵
- Drops file in Windows directory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE51⤵PID:668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"52⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE53⤵PID:1548
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"54⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE55⤵PID:1528
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"56⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE57⤵PID:1060
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"58⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE59⤵PID:912
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"60⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE61⤵PID:1960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"62⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE63⤵PID:1516
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"64⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE65⤵PID:1624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"66⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE67⤵PID:1364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"68⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE69⤵PID:616
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"70⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE71⤵PID:452
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"72⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE73⤵PID:908
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"74⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE75⤵PID:948
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"76⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE77⤵PID:1452
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"78⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE79⤵PID:1460
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"80⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE81⤵PID:1124
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"82⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE83⤵PID:524
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"84⤵PID:728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE85⤵PID:972
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"86⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE87⤵PID:896
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"88⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE89⤵PID:1608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"90⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE91⤵PID:1592
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"92⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE93⤵PID:1096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"94⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE95⤵PID:1260
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"96⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE97⤵PID:1800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"98⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE99⤵PID:1416
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"100⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE101⤵PID:1300
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"102⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE103⤵PID:1284
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"104⤵
- Drops file in Windows directory
PID:704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE105⤵PID:1848
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"106⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE107⤵PID:1048
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"108⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE109⤵PID:1104
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"110⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE111⤵PID:1940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"112⤵PID:360
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE113⤵PID:284
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"114⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE115⤵PID:1664
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"116⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE117⤵PID:1368
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"118⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE119⤵PID:1512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"120⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE121⤵PID:1932
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"122⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE123⤵PID:760
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"124⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE125⤵PID:1600
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"126⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE127⤵PID:1968
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"128⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE129⤵PID:1804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"130⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE131⤵PID:1220
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"132⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE133⤵PID:968
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"134⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE135⤵PID:1080
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"136⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE137⤵PID:1736
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"138⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE139⤵PID:1936
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"140⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE141⤵PID:588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"142⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE143⤵PID:1564
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"144⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE145⤵PID:1876
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"146⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE147⤵PID:740
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"148⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE149⤵PID:1640
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"150⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE151⤵PID:268
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"152⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE153⤵PID:1484
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"154⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE155⤵PID:1436
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"156⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE157⤵PID:1560
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"158⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE159⤵PID:1960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"160⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE161⤵PID:1712
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"162⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE163⤵PID:324
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"164⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE165⤵PID:1700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"166⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE167⤵PID:1704
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"168⤵
- Drops file in Windows directory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE169⤵PID:1612
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"170⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE171⤵PID:1380
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"172⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE173⤵PID:1636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"174⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE175⤵PID:1460
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"176⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE177⤵PID:1124
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"178⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE179⤵PID:1664
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"180⤵PID:652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE181⤵PID:740
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"182⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE183⤵PID:296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"184⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE185⤵PID:2044
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"186⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE187⤵PID:1484
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"188⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE189⤵PID:1436
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"190⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE191⤵PID:1272
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"192⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE193⤵PID:1800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"194⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE195⤵PID:904
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"196⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE197⤵PID:1716
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"198⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE199⤵PID:1080
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"200⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE201⤵PID:1692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"202⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE203⤵PID:1936
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"204⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE205⤵PID:588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"206⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE207⤵PID:1788
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"208⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE209⤵PID:284
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"210⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE211⤵PID:668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"212⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE213⤵PID:652
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"214⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE215⤵PID:1632
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"216⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE217⤵PID:1528
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"218⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE219⤵PID:976
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"220⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE221⤵PID:1872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"222⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE223⤵PID:984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"224⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE225⤵PID:1328
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"226⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE227⤵PID:1580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"228⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE229⤵PID:1700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"230⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE231⤵PID:1848
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"232⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE233⤵PID:828
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"234⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE235⤵PID:704
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"236⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE237⤵PID:820
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"238⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE239⤵PID:1668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"240⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE241⤵PID:1172
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8DA574~1.EXE"242⤵PID:1536