Analysis
-
max time kernel
151s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
20-11-2022 11:51
Behavioral task
behavioral1
Sample
5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe
Resource
win10v2004-20221111-en
General
-
Target
5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe
-
Size
696KB
-
MD5
09adbf0b5c41f32a324991e341acdf01
-
SHA1
d3744a87544c5eb7142dba16050f69f1a35834df
-
SHA256
5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813
-
SHA512
7190ba086d96a335348189d7e9dbe56f5128621198042c01876e83b1d40e621acb293265423853c1a8abb27045b7d6c477065c3211f61814e520d12301ca16ad
-
SSDEEP
6144:k9uF1mDdkrsqhD5rrVn/H6UfMV38vfMV38v9N9N9N9N9N9N9N9N9N9N9:FKDdkr/D5rpv6Ussvss
Malware Config
Signatures
-
Detect Neshta payload 48 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe family_neshta \PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe family_neshta C:\Windows\svchost.com family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe family_neshta C:\Windows\svchost.com family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exesvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.compid process 1992 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe 584 svchost.com 1116 5D83F6~1.EXE 1004 svchost.com 636 5D83F6~1.EXE 540 svchost.com 756 5D83F6~1.EXE 1064 svchost.com 1144 5D83F6~1.EXE 1812 svchost.com 672 5D83F6~1.EXE 524 svchost.com 1416 5D83F6~1.EXE 1728 svchost.com 2044 5D83F6~1.EXE 668 svchost.com 768 5D83F6~1.EXE 1700 svchost.com 704 5D83F6~1.EXE 1100 svchost.com 324 5D83F6~1.EXE 1552 svchost.com 1032 5D83F6~1.EXE 756 svchost.com 1392 5D83F6~1.EXE 872 svchost.com 1064 5D83F6~1.EXE 800 svchost.com 1304 5D83F6~1.EXE 1812 svchost.com 672 5D83F6~1.EXE 1688 svchost.com 1748 5D83F6~1.EXE 524 svchost.com 948 5D83F6~1.EXE 364 svchost.com 1168 5D83F6~1.EXE 1340 svchost.com 1164 5D83F6~1.EXE 580 svchost.com 684 5D83F6~1.EXE 688 svchost.com 960 5D83F6~1.EXE 1764 svchost.com 1564 5D83F6~1.EXE 316 svchost.com 1668 5D83F6~1.EXE 1972 svchost.com 1392 5D83F6~1.EXE 284 svchost.com 1884 5D83F6~1.EXE 1636 svchost.com 2040 5D83F6~1.EXE 1720 svchost.com 1344 5D83F6~1.EXE 1748 svchost.com 852 5D83F6~1.EXE 452 svchost.com 1964 5D83F6~1.EXE 1712 svchost.com 772 5D83F6~1.EXE 584 svchost.com 1988 5D83F6~1.EXE 824 svchost.com -
Loads dropped DLL 64 IoCs
Processes:
5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.compid process 1336 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe 1336 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe 584 svchost.com 584 svchost.com 1004 svchost.com 1004 svchost.com 540 svchost.com 540 svchost.com 1064 svchost.com 1064 svchost.com 1812 svchost.com 1812 svchost.com 524 svchost.com 524 svchost.com 1336 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe 1992 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe 1992 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe 1728 svchost.com 1728 svchost.com 668 svchost.com 668 svchost.com 1992 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe 1700 svchost.com 1700 svchost.com 1100 svchost.com 1100 svchost.com 1992 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe 1552 svchost.com 1552 svchost.com 1336 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe 756 svchost.com 756 svchost.com 872 svchost.com 872 svchost.com 800 svchost.com 800 svchost.com 1812 svchost.com 1812 svchost.com 1688 svchost.com 1688 svchost.com 524 svchost.com 524 svchost.com 364 svchost.com 364 svchost.com 1340 svchost.com 1340 svchost.com 580 svchost.com 580 svchost.com 688 svchost.com 688 svchost.com 1764 svchost.com 1764 svchost.com 316 svchost.com 316 svchost.com 1972 svchost.com 1972 svchost.com 284 svchost.com 284 svchost.com 1636 svchost.com 1636 svchost.com 1720 svchost.com 1720 svchost.com 1748 svchost.com 1748 svchost.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exedescription ioc process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.com5D83F6~1.EXEsvchost.comsvchost.com5D83F6~1.EXE5D83F6~1.EXE5D83F6~1.EXE5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXE5D83F6~1.EXEsvchost.com5D83F6~1.EXE5D83F6~1.EXEsvchost.comsvchost.com5D83F6~1.EXE5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.comsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXE5D83F6~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXE5D83F6~1.EXEdescription ioc process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5D83F6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 5D83F6~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys 5D83F6~1.EXE File opened for modification C:\Windows\svchost.com 5D83F6~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys 5D83F6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 5D83F6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5D83F6~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 5D83F6~1.EXE File opened for modification C:\Windows\svchost.com 5D83F6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5D83F6~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com 5D83F6~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 5D83F6~1.EXE File opened for modification C:\Windows\svchost.com 5D83F6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 5D83F6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com 5D83F6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 5D83F6~1.EXE File opened for modification C:\Windows\directx.sys 5D83F6~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 5D83F6~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com 5D83F6~1.EXE File opened for modification C:\Windows\directx.sys 5D83F6~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exesvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEsvchost.com5D83F6~1.EXEdescription pid process target process PID 1336 wrote to memory of 1992 1336 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe PID 1336 wrote to memory of 1992 1336 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe PID 1336 wrote to memory of 1992 1336 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe PID 1336 wrote to memory of 1992 1336 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe PID 1992 wrote to memory of 584 1992 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe svchost.com PID 1992 wrote to memory of 584 1992 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe svchost.com PID 1992 wrote to memory of 584 1992 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe svchost.com PID 1992 wrote to memory of 584 1992 5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe svchost.com PID 584 wrote to memory of 1116 584 svchost.com 5D83F6~1.EXE PID 584 wrote to memory of 1116 584 svchost.com 5D83F6~1.EXE PID 584 wrote to memory of 1116 584 svchost.com 5D83F6~1.EXE PID 584 wrote to memory of 1116 584 svchost.com 5D83F6~1.EXE PID 1116 wrote to memory of 1004 1116 5D83F6~1.EXE svchost.com PID 1116 wrote to memory of 1004 1116 5D83F6~1.EXE svchost.com PID 1116 wrote to memory of 1004 1116 5D83F6~1.EXE svchost.com PID 1116 wrote to memory of 1004 1116 5D83F6~1.EXE svchost.com PID 1004 wrote to memory of 636 1004 svchost.com 5D83F6~1.EXE PID 1004 wrote to memory of 636 1004 svchost.com 5D83F6~1.EXE PID 1004 wrote to memory of 636 1004 svchost.com 5D83F6~1.EXE PID 1004 wrote to memory of 636 1004 svchost.com 5D83F6~1.EXE PID 636 wrote to memory of 540 636 5D83F6~1.EXE svchost.com PID 636 wrote to memory of 540 636 5D83F6~1.EXE svchost.com PID 636 wrote to memory of 540 636 5D83F6~1.EXE svchost.com PID 636 wrote to memory of 540 636 5D83F6~1.EXE svchost.com PID 540 wrote to memory of 756 540 svchost.com 5D83F6~1.EXE PID 540 wrote to memory of 756 540 svchost.com 5D83F6~1.EXE PID 540 wrote to memory of 756 540 svchost.com 5D83F6~1.EXE PID 540 wrote to memory of 756 540 svchost.com 5D83F6~1.EXE PID 756 wrote to memory of 1064 756 5D83F6~1.EXE svchost.com PID 756 wrote to memory of 1064 756 5D83F6~1.EXE svchost.com PID 756 wrote to memory of 1064 756 5D83F6~1.EXE svchost.com PID 756 wrote to memory of 1064 756 5D83F6~1.EXE svchost.com PID 1064 wrote to memory of 1144 1064 svchost.com 5D83F6~1.EXE PID 1064 wrote to memory of 1144 1064 svchost.com 5D83F6~1.EXE PID 1064 wrote to memory of 1144 1064 svchost.com 5D83F6~1.EXE PID 1064 wrote to memory of 1144 1064 svchost.com 5D83F6~1.EXE PID 1144 wrote to memory of 1812 1144 5D83F6~1.EXE svchost.com PID 1144 wrote to memory of 1812 1144 5D83F6~1.EXE svchost.com PID 1144 wrote to memory of 1812 1144 5D83F6~1.EXE svchost.com PID 1144 wrote to memory of 1812 1144 5D83F6~1.EXE svchost.com PID 1812 wrote to memory of 672 1812 svchost.com 5D83F6~1.EXE PID 1812 wrote to memory of 672 1812 svchost.com 5D83F6~1.EXE PID 1812 wrote to memory of 672 1812 svchost.com 5D83F6~1.EXE PID 1812 wrote to memory of 672 1812 svchost.com 5D83F6~1.EXE PID 672 wrote to memory of 524 672 5D83F6~1.EXE svchost.com PID 672 wrote to memory of 524 672 5D83F6~1.EXE svchost.com PID 672 wrote to memory of 524 672 5D83F6~1.EXE svchost.com PID 672 wrote to memory of 524 672 5D83F6~1.EXE svchost.com PID 524 wrote to memory of 1416 524 svchost.com 5D83F6~1.EXE PID 524 wrote to memory of 1416 524 svchost.com 5D83F6~1.EXE PID 524 wrote to memory of 1416 524 svchost.com 5D83F6~1.EXE PID 524 wrote to memory of 1416 524 svchost.com 5D83F6~1.EXE PID 1416 wrote to memory of 1728 1416 5D83F6~1.EXE svchost.com PID 1416 wrote to memory of 1728 1416 5D83F6~1.EXE svchost.com PID 1416 wrote to memory of 1728 1416 5D83F6~1.EXE svchost.com PID 1416 wrote to memory of 1728 1416 5D83F6~1.EXE svchost.com PID 1728 wrote to memory of 2044 1728 svchost.com 5D83F6~1.EXE PID 1728 wrote to memory of 2044 1728 svchost.com 5D83F6~1.EXE PID 1728 wrote to memory of 2044 1728 svchost.com 5D83F6~1.EXE PID 1728 wrote to memory of 2044 1728 svchost.com 5D83F6~1.EXE PID 2044 wrote to memory of 668 2044 5D83F6~1.EXE svchost.com PID 2044 wrote to memory of 668 2044 5D83F6~1.EXE svchost.com PID 2044 wrote to memory of 668 2044 5D83F6~1.EXE svchost.com PID 2044 wrote to memory of 668 2044 5D83F6~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe"C:\Users\Admin\AppData\Local\Temp\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\5d83f64680c6671b004ef10f7e93b68a5d282a067a10db94617adba811e8e813.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE18⤵
- Executes dropped EXE
PID:768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE20⤵
- Executes dropped EXE
PID:704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE22⤵
- Executes dropped EXE
PID:324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE24⤵
- Executes dropped EXE
PID:1032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE26⤵
- Executes dropped EXE
PID:1392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE28⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE30⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE32⤵
- Executes dropped EXE
PID:672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE34⤵
- Executes dropped EXE
PID:1748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE36⤵
- Executes dropped EXE
PID:948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE38⤵
- Executes dropped EXE
PID:1168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE40⤵
- Executes dropped EXE
PID:1164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE42⤵
- Executes dropped EXE
PID:684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE44⤵
- Executes dropped EXE
PID:960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE46⤵
- Executes dropped EXE
PID:1564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE48⤵
- Executes dropped EXE
PID:1668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE50⤵
- Executes dropped EXE
PID:1392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:284 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE52⤵
- Executes dropped EXE
PID:1884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE54⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE56⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE58⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"59⤵
- Executes dropped EXE
PID:452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE60⤵
- Executes dropped EXE
PID:1964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"61⤵
- Executes dropped EXE
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE62⤵
- Executes dropped EXE
PID:772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"63⤵
- Executes dropped EXE
PID:584 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE64⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"65⤵
- Executes dropped EXE
PID:824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE66⤵
- Drops file in Windows directory
PID:1700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"67⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE68⤵PID:1836
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"69⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE70⤵PID:324
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"71⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE72⤵PID:1872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"73⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE74⤵PID:432
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"75⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE76⤵PID:2004
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"77⤵PID:284
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE78⤵PID:1884
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"79⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE80⤵PID:1636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"81⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE82⤵PID:1772
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"83⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE84⤵PID:1748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"85⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE86⤵PID:1728
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"87⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE88⤵PID:1496
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"89⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE90⤵PID:692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"91⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE92⤵PID:684
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"93⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE94⤵PID:960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"95⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE96⤵PID:328
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"97⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE98⤵PID:1976
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"99⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE100⤵PID:756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"101⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE102⤵PID:1928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"103⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE104⤵PID:1816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"105⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE106⤵PID:952
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"107⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE108⤵PID:1636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"109⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE110⤵PID:1344
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"111⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE112⤵PID:1644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"113⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE114⤵PID:1544
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"115⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE116⤵PID:1496
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"117⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE118⤵PID:772
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"119⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE120⤵PID:704
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"121⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE122⤵PID:1548
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"123⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE124⤵
- Drops file in Windows directory
PID:1564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"125⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE126⤵PID:1668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"127⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE128⤵PID:1684
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"129⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE130⤵PID:872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"131⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE132⤵PID:1768
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"133⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE134⤵PID:1884
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"135⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE136⤵PID:1688
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"137⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE138⤵PID:1812
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"139⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE140⤵PID:1624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"141⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE142⤵PID:1256
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"143⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE144⤵PID:1164
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"145⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE146⤵PID:1412
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"147⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE148⤵PID:684
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"149⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE150⤵PID:804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"151⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE152⤵PID:1552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"153⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE154⤵PID:1808
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"155⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE156⤵PID:360
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"157⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE158⤵PID:872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"159⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE160⤵PID:1204
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"161⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE162⤵PID:924
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"163⤵PID:524
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE164⤵PID:948
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"165⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE166⤵PID:1964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"167⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE168⤵PID:2024
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"169⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE170⤵PID:580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"171⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE172⤵PID:692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"173⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE174⤵PID:1364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"175⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE176⤵PID:1676
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"177⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE178⤵PID:1996
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"179⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE180⤵PID:316
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"181⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE182⤵PID:324
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"183⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE184⤵PID:1972
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"185⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE186⤵PID:1304
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"187⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE188⤵PID:672
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"189⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE190⤵PID:952
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"191⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE192⤵PID:524
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"193⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE194⤵PID:1616
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"195⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE196⤵PID:2044
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"197⤵PID:520
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE198⤵PID:1512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"199⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE200⤵PID:364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"201⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE202⤵PID:604
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"203⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE204⤵PID:1052
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"205⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE206⤵PID:1776
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"207⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE208⤵PID:1144
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"209⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE210⤵PID:1928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"211⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE212⤵PID:284
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"213⤵PID:280
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE214⤵PID:1876
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"215⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE1⤵PID:1636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"2⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE3⤵PID:1344
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"4⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE5⤵PID:1772
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"6⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE7⤵PID:268
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"8⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE9⤵PID:912
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"10⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE11⤵PID:1164
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"12⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE13⤵PID:1568
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"14⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE15⤵PID:1700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"16⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE17⤵PID:1696
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"18⤵PID:328
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE19⤵PID:752
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"20⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE21⤵PID:1552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"22⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE23⤵PID:1808
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"24⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE25⤵PID:1872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"26⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE27⤵PID:280
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"28⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE29⤵PID:1612
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"30⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE31⤵PID:1732
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"32⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE33⤵PID:948
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"34⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE35⤵PID:1624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"36⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE37⤵PID:2024
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"38⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE39⤵PID:1116
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"40⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE41⤵PID:1004
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"42⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE43⤵PID:1364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"44⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE45⤵PID:1676
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"46⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE47⤵PID:328
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"48⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE49⤵PID:1392
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"50⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE51⤵PID:1472
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"52⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE53⤵PID:284
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"54⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE55⤵PID:672
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"56⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE57⤵PID:2040
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"58⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE59⤵PID:1384
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"60⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE61⤵PID:1528
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"62⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE63⤵PID:1712
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"64⤵PID:520
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE65⤵PID:1256
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"66⤵PID:692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE67⤵PID:1248
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"68⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE69⤵PID:772
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"70⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE71⤵PID:704
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"72⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE73⤵PID:1776
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"74⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE75⤵PID:800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"76⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE77⤵PID:360
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"78⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE79⤵PID:1684
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"80⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE81⤵PID:1348
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"82⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE83⤵PID:1636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"84⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE85⤵PID:952
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"86⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE87⤵
- Drops file in Windows directory
PID:1344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"88⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE89⤵PID:1720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"90⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE91⤵PID:1748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"92⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE93⤵PID:1988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"94⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE95⤵PID:1248
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"96⤵PID:1412
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE97⤵PID:1352
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"98⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE99⤵PID:804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"100⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE101⤵PID:1564
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"102⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE103⤵PID:752
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"104⤵PID:1768
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE105⤵PID:1552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"106⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE107⤵PID:1808
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"108⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE109⤵PID:1348
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"110⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE111⤵PID:1636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"112⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE113⤵PID:952
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"114⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE115⤵PID:268
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"116⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE117⤵PID:1920
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"118⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE119⤵PID:580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"120⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE121⤵
- Drops file in Windows directory
PID:692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"122⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE123⤵PID:1192
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"124⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE125⤵PID:1012
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"126⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE99⤵PID:1836
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"100⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE101⤵PID:1668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"102⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE103⤵PID:112
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"104⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE105⤵PID:872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"106⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE107⤵PID:1872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"108⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE109⤵PID:1348
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"110⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE111⤵
- Drops file in Windows directory
PID:1636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"112⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE113⤵PID:952
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"114⤵PID:1340
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE115⤵PID:1720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"116⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE117⤵PID:1748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"118⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE119⤵PID:580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"120⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE121⤵PID:692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"122⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE123⤵PID:1192
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"124⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE125⤵PID:704
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"126⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE127⤵PID:328
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"128⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE129⤵PID:1708
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"130⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE131⤵PID:1064
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"132⤵PID:284
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE133⤵PID:1808
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"134⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE135⤵PID:672
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"136⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE137⤵PID:1688
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"138⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE139⤵PID:2040
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"140⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE141⤵PID:1168
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"142⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE143⤵PID:824
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"144⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE145⤵PID:1748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"146⤵PID:688
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE147⤵PID:1496
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"148⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE149⤵PID:692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"150⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE151⤵PID:1052
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"152⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE153⤵PID:756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"154⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE155⤵PID:1668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"156⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE157⤵PID:1928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"158⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE159⤵PID:564
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"160⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE161⤵PID:1756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"162⤵
- Drops file in Windows directory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE163⤵PID:1384
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"164⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE165⤵PID:1624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"166⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE167⤵PID:2024
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"168⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE169⤵PID:828
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"170⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE171⤵PID:1568
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"172⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE173⤵PID:668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"174⤵PID:684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE175⤵PID:1676
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"176⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE177⤵PID:960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"178⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE179⤵PID:1032
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"180⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE181⤵PID:1144
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"182⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE183⤵PID:112
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"184⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE185⤵PID:872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"186⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE187⤵PID:524
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"188⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE189⤵PID:1772
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"190⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE191⤵PID:572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"192⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE193⤵PID:268
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"194⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE195⤵PID:1920
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"196⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE197⤵
- Drops file in Windows directory
PID:1224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"198⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE199⤵PID:1412
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"200⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE201⤵PID:1696
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"202⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE203⤵PID:1352
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"204⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE205⤵PID:804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"206⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE207⤵PID:2028
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"208⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE209⤵PID:1472
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"210⤵
- Drops file in Windows directory
PID:752 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE211⤵PID:280
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"212⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE213⤵PID:1572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"214⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE215⤵PID:1812
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"216⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE217⤵PID:1636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"218⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE219⤵PID:572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"220⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE221⤵PID:268
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"222⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE223⤵PID:1920
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"224⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE225⤵PID:912
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"226⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE227⤵PID:688
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"228⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE229⤵PID:636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"230⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE231⤵PID:364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"232⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE233⤵PID:804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"234⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE235⤵PID:2028
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"236⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE237⤵PID:1472
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"238⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE239⤵PID:280
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"240⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE241⤵PID:1572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5D83F6~1.EXE"242⤵PID:1616