Analysis
-
max time kernel
191s -
max time network
198s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 09:40
Static task
static1
Behavioral task
behavioral1
Sample
5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe
Resource
win10v2004-20221111-en
General
-
Target
5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe
-
Size
336KB
-
MD5
baaa635f843f9759a5dd3829a92d72d5
-
SHA1
5eb12cc8673caad9c95c1768bde04d28b3b53fa2
-
SHA256
5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a
-
SHA512
dd5685f2d184e357246b7e5b41b5c23ca87caf7d205bd66b67796b6dc91d4c16cd652a9afdeaf9d6d45e8d20afba1cdbab59479bf40a032748e364bfa27c62bd
-
SSDEEP
3072:CxLgJ+ejdnp4Xk6gD7MDDMPAGawxxuhKYMNowDnyy5dPathmxZ5JTt9cRuP7d2Zu:Ci8qnE+YD0aguIZrPYuJhqR2x2sd6Dt
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\40907 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\msoozqi.bat" svchost.exe -
Uses the VBS compiler for execution 1 TTPs
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4060001867-1434967833-2212371794-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WildTangent Games App = "C:\\Users\\Admin\\AppData\\Local\\Temp\\5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe" 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
Processes:
vbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exedescription ioc process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\disk\enum vbc.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 vbc.exe -
Suspicious use of SetThreadContext 64 IoCs
Processes:
5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exedescription pid process target process PID 1960 set thread context of 5104 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3636 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 2700 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 5084 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3432 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3964 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 4028 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 420 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1344 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1768 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 4824 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 4380 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3644 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1872 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 2856 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1812 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 2564 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 5048 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1280 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 4000 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 2204 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1644 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3764 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3516 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3228 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1772 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 644 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 668 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1100 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 4400 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3472 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 2268 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 2076 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3460 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1608 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3596 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3488 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1884 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 620 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3132 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 4876 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 5012 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1584 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1284 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 5108 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3392 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 4544 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 4576 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 2696 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 2680 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3892 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 4596 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3696 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3104 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 4700 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 4976 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 3452 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1620 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1664 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1404 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 948 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 2884 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1296 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 set thread context of 1736 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe -
Drops file in Program Files directory 1 IoCs
Processes:
svchost.exedescription ioc process File created C:\PROGRA~3\LOCALS~1\Temp\msoozqi.bat svchost.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exesvchost.exedescription ioc process File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe File opened for modification C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
vbc.exe5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exepid process 5104 vbc.exe 5104 vbc.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 3636 vbc.exe 3636 vbc.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 2700 vbc.exe 2700 vbc.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 5084 vbc.exe 5084 vbc.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 3432 vbc.exe 3432 vbc.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 3964 vbc.exe 3964 vbc.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 4028 vbc.exe 4028 vbc.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 420 vbc.exe 420 vbc.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe -
Suspicious behavior: MapViewOfSection 64 IoCs
Processes:
vbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exepid process 5104 vbc.exe 5104 vbc.exe 3636 vbc.exe 3636 vbc.exe 2700 vbc.exe 2700 vbc.exe 5084 vbc.exe 5084 vbc.exe 3432 vbc.exe 3432 vbc.exe 3964 vbc.exe 3964 vbc.exe 4028 vbc.exe 4028 vbc.exe 420 vbc.exe 420 vbc.exe 1344 vbc.exe 1344 vbc.exe 1768 vbc.exe 1768 vbc.exe 4824 vbc.exe 4824 vbc.exe 4380 vbc.exe 4380 vbc.exe 3644 vbc.exe 3644 vbc.exe 1872 vbc.exe 1872 vbc.exe 2856 vbc.exe 2856 vbc.exe 1812 vbc.exe 1812 vbc.exe 2564 vbc.exe 2564 vbc.exe 5048 vbc.exe 5048 vbc.exe 1280 vbc.exe 1280 vbc.exe 4000 vbc.exe 4000 vbc.exe 2204 vbc.exe 2204 vbc.exe 1644 vbc.exe 1644 vbc.exe 3764 vbc.exe 3764 vbc.exe 3516 vbc.exe 3516 vbc.exe 3228 vbc.exe 3228 vbc.exe 1772 vbc.exe 1772 vbc.exe 644 vbc.exe 644 vbc.exe 668 vbc.exe 668 vbc.exe 1100 vbc.exe 1100 vbc.exe 4400 vbc.exe 4400 vbc.exe 3472 vbc.exe 3472 vbc.exe 2268 vbc.exe 2268 vbc.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exedescription pid process Token: SeDebugPrivilege 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exevbc.exedescription pid process target process PID 1960 wrote to memory of 5104 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 5104 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 5104 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 5104 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 5104 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 5104 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 5104 wrote to memory of 3368 5104 vbc.exe svchost.exe PID 5104 wrote to memory of 3368 5104 vbc.exe svchost.exe PID 5104 wrote to memory of 3368 5104 vbc.exe svchost.exe PID 1960 wrote to memory of 3636 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 3636 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 3636 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 3636 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 3636 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 3636 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 3636 wrote to memory of 5060 3636 vbc.exe svchost.exe PID 3636 wrote to memory of 5060 3636 vbc.exe svchost.exe PID 3636 wrote to memory of 5060 3636 vbc.exe svchost.exe PID 1960 wrote to memory of 2700 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 2700 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 2700 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 2700 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 2700 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 2700 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 2700 wrote to memory of 3116 2700 vbc.exe svchost.exe PID 2700 wrote to memory of 3116 2700 vbc.exe svchost.exe PID 2700 wrote to memory of 3116 2700 vbc.exe svchost.exe PID 1960 wrote to memory of 5084 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 5084 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 5084 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 5084 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 5084 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 5084 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 5084 wrote to memory of 1824 5084 vbc.exe svchost.exe PID 5084 wrote to memory of 1824 5084 vbc.exe svchost.exe PID 5084 wrote to memory of 1824 5084 vbc.exe svchost.exe PID 1960 wrote to memory of 3432 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 3432 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 3432 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 3432 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 3432 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 3432 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 3432 wrote to memory of 4612 3432 vbc.exe svchost.exe PID 3432 wrote to memory of 4612 3432 vbc.exe svchost.exe PID 3432 wrote to memory of 4612 3432 vbc.exe svchost.exe PID 1960 wrote to memory of 3964 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 3964 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 3964 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 3964 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 3964 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 3964 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 3964 wrote to memory of 4792 3964 vbc.exe svchost.exe PID 3964 wrote to memory of 4792 3964 vbc.exe svchost.exe PID 3964 wrote to memory of 4792 3964 vbc.exe svchost.exe PID 1960 wrote to memory of 4028 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 4028 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 4028 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 4028 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 4028 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 1960 wrote to memory of 4028 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe PID 4028 wrote to memory of 64 4028 vbc.exe svchost.exe PID 4028 wrote to memory of 64 4028 vbc.exe svchost.exe PID 4028 wrote to memory of 64 4028 vbc.exe svchost.exe PID 1960 wrote to memory of 420 1960 5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe"C:\Users\Admin\AppData\Local\Temp\5ff6d4c6e029a7fa2586f6f82d5954fb39502949f78e250adc4547db249bcc0a.exe"1⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3368
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5060
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
- Drops file in Windows directory
PID:3116 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:5084 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:1824 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4612
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:4792 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:64
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
PID:420 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1220
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:1344 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5016
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:1768 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2328
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:4824 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4024
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:4380 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2124
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:3644 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3900
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:1872 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3140
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:2856 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4080
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:1812 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1548
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:2564 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:816
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:5048 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3688
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:1280 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4700
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
- Suspicious behavior: MapViewOfSection
PID:4000 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:3612 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
- Suspicious behavior: MapViewOfSection
PID:2204 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4052
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
- Suspicious behavior: MapViewOfSection
PID:1644 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2064
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
- Suspicious behavior: MapViewOfSection
PID:3764 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2244
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:3516 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3704
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:3228 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4812
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:1772 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2388
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:644 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1292
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:668 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1948
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
- Suspicious behavior: MapViewOfSection
PID:1100 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4240
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:4400 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:4448 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
- Suspicious behavior: MapViewOfSection
PID:3472 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:1212 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Suspicious behavior: MapViewOfSection
PID:2268 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:2148 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2076
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1668
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3460
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:3480 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1608
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:740
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3596
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:848
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3488
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:4860 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:1884 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4932
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:620
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4548
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:3132 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4868
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4876
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:440 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:5012 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:2088 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:1584 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3108
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:1284 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5024
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5108
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4816
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3392
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3172
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4544
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:1916 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4576
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3344
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2696
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3768
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:2680 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1104
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:3892 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3396
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4596
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1964
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3696
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3572
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3104
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4840
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:4700 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3676
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4976
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1408
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3452
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3136
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1620
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2112
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1664
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:3048 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1404
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:2552 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:948
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1468
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:2884 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:1560 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1296
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:1216 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:1736 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1080
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4360
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2968
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:216
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2352
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2600
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4580
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:3672 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:2876 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:1328 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4284
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4412
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:2320 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2188
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4076
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:4892 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3876
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4388
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3988
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4332
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4960
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4520
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2240
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4944
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:2960 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3428
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4928
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:2956 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:612 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:688
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:4196 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4904
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:732
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4168
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:2332 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2072
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4852
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:4920 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3560
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1096
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4632
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:3912 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4512
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4564
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:1360 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:1560 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:3436 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1208
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2156
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4848
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1876
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1880
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3184
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4408
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3880
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3832
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:4620 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:4948 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:4276 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1572
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3160
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4684
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4300
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5008
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:4488 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4048
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1516
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:4768 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4844
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5020
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:392
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4724
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3320
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2288
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:2152 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3440
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4864
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:4780 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:3568 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4660
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2052
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4120
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2712
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1468
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1364
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2636
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4308
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4432
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:4828 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3420
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3152
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4008
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3776
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1612
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1720
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:2656 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2216
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1976
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4268
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3332
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1592
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1992
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3680
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3168
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4788
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4740
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4540
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3360
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1556
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4340
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4032
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:2284 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4464
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4820
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1132
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:372
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:796
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2092
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4680
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2364
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4320
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4896
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:116
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:1504 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:748 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4716
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4912
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:376
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:2236 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5140
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5160
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5268
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:5292 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5332
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5352
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5372
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5392
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5412
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5432
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5488
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5508
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5524
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5560
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:5584 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:5604 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5624
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5644
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5680
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5700
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5720
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5740
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5760
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5780
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5800
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5820
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5868
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5888
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5908
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5928
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5948
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:5968 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:5988 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6008
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6052
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:6072 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6092
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6112
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6132
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:4284 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5264
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4404
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5384
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5420
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5468
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5484
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1008
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:5556 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5544
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2164
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5656
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4916
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5688
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4424
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3052
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5776
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5848
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5864
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5880
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5916
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5944
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5436
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:5996 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6032
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6068 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5572
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6128
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3996
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5668
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5284
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5340
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5704
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4004
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:5788 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:5860 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:1188 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5596
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5664
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5940
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5972
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3276
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:5844 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6084 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5364
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5956
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:5152 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5368
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:5428 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5136
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5496
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5040
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4592
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5620
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:5500 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5728
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5676
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5976
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5172
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:5808 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5836
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6080
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5456
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:3056 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5612
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5648
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5388
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5480
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5856
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5636
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4368
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3600
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5404
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:5920 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:5168 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4056
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5816
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4764
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5600
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:2412 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:952 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5280
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2648
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6044 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3280
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:680
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4420
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2508
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5520
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5236
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3864
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5692
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:5156 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:5924 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1264
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:2740
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5732
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5308
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2220
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4772
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5424
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5288
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3628
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5080
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:4888 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1792
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:3024 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:5380 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6120
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4668
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5460
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3556
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:5148 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4908
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:952
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1568
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4648
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:528 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5712
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6156
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6180
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6208
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6228
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6248
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6268
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6288 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6308
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6352
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6372
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6392
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6412
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6432
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6452
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6472
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6492
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6528
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6548
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6568
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6588
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6608
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6628
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6648
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6668
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6708 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:6728 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6748
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6768
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6788
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6808
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6828
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6848
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6892
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6912
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6932 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6952
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6972 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6992
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:7016
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:7040 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:7072
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:7092
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:7112
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:7132
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:7152
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:4656 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:5316 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:6216 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6060
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4296
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6296
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:6324 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6348
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5708
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5028
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:3280 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6484
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5300
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4164
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6624
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:1588
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:6688 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6720
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6756
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6280 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6800
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6836
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6872
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6384
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:6904 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6980
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:7008
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:7024
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6552
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6028
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:7108
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5512
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6152
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6188
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5260
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6256
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5608
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6812 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5904
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6448
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6488
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6964
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5156
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:7004
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:6184 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:7044
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:5192 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:3916
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6804
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:7140
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5732
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6424 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6908
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:540
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:1244
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:4888
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6400
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:7148
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:6700 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:5312 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6736
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6780
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6332
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6716 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6444
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6516 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6824
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6660
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6844
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6784
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3004
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:7012
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:6556 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:7128
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6284
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6500
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6600
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6772
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:6524 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6364 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5796
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6508
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6996
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6536 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6704
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6416
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6796
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6560 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:3588
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6224
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6328
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:1244 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Drops file in Windows directory
PID:7164 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6816
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6468
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5516
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6676
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:7060
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:7100
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6924
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6944
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:5200
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6740
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:7028
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6168
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:7068
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:7032
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6428 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6592
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6408
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6640
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:4248 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6940
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6876
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:4384
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:7144
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:6596
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵
- Maps connected drives based on registry
PID:6616 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:7080
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:6300
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:2316
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe2⤵PID:7160
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:320