Analysis
-
max time kernel
151s -
max time network
36s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 08:04
Behavioral task
behavioral1
Sample
d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe
Resource
win10v2004-20220812-en
General
-
Target
d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe
-
Size
522KB
-
MD5
434f79ef8e264278969782a88c97f7b0
-
SHA1
44c40e7c13eddbfa0eee0062574b3d7e44b49c9a
-
SHA256
d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff
-
SHA512
a45fc8d6c85b27e5dd9ec70ddc8708136e7f90517a21922fd566d965fd3004c5363f5e1145de3d50a82f523d5efd343f336e7993d3390342a073c5d2d58c45cb
-
SSDEEP
6144:k9/UWdbEiGuq1ghByKMIVIa/HbrbfPFJJd1g7RGjQVOqEhNk9r9:gBdbEvghBXcGHb/ftJ5m4QVM
Malware Config
Signatures
-
Detect Neshta payload 47 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta \MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Windows\svchost.com family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe family_neshta C:\Windows\svchost.com family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exesvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.compid process 772 d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe 468 svchost.com 1760 D778AB~1.EXE 1636 svchost.com 892 D778AB~1.EXE 2016 svchost.com 624 D778AB~1.EXE 1168 svchost.com 1872 D778AB~1.EXE 960 svchost.com 944 D778AB~1.EXE 1428 svchost.com 1832 D778AB~1.EXE 1772 svchost.com 1164 D778AB~1.EXE 1748 svchost.com 1404 D778AB~1.EXE 1928 svchost.com 468 D778AB~1.EXE 1284 svchost.com 1660 D778AB~1.EXE 892 svchost.com 1420 D778AB~1.EXE 1692 svchost.com 624 D778AB~1.EXE 1116 svchost.com 1680 D778AB~1.EXE 1168 svchost.com 1204 D778AB~1.EXE 860 svchost.com 1612 D778AB~1.EXE 1400 svchost.com 1716 D778AB~1.EXE 900 svchost.com 1096 D778AB~1.EXE 1724 svchost.com 660 D778AB~1.EXE 600 svchost.com 1704 D778AB~1.EXE 1492 svchost.com 1760 D778AB~1.EXE 896 svchost.com 1912 D778AB~1.EXE 1424 svchost.com 1800 D778AB~1.EXE 1952 svchost.com 1940 D778AB~1.EXE 1644 svchost.com 2024 D778AB~1.EXE 1072 svchost.com 1116 D778AB~1.EXE 1196 svchost.com 1168 D778AB~1.EXE 812 svchost.com 1956 D778AB~1.EXE 1504 svchost.com 1428 D778AB~1.EXE 1564 svchost.com 1832 D778AB~1.EXE 1164 svchost.com 1576 D778AB~1.EXE 1488 svchost.com 924 D778AB~1.EXE 108 svchost.com -
Loads dropped DLL 64 IoCs
Processes:
d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.compid process 792 d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe 792 d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe 468 svchost.com 468 svchost.com 1636 svchost.com 1636 svchost.com 2016 svchost.com 2016 svchost.com 792 d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe 1168 svchost.com 1168 svchost.com 960 svchost.com 960 svchost.com 1428 svchost.com 1428 svchost.com 1772 svchost.com 1772 svchost.com 1748 svchost.com 1748 svchost.com 1928 svchost.com 1928 svchost.com 1284 svchost.com 1284 svchost.com 892 svchost.com 892 svchost.com 1692 svchost.com 1692 svchost.com 1116 svchost.com 1116 svchost.com 1168 svchost.com 1168 svchost.com 860 svchost.com 860 svchost.com 1400 svchost.com 1400 svchost.com 900 svchost.com 900 svchost.com 1724 svchost.com 1724 svchost.com 600 svchost.com 600 svchost.com 1492 svchost.com 1492 svchost.com 896 svchost.com 896 svchost.com 1424 svchost.com 1424 svchost.com 1952 svchost.com 1952 svchost.com 1644 svchost.com 1644 svchost.com 1072 svchost.com 1072 svchost.com 1196 svchost.com 1196 svchost.com 812 svchost.com 812 svchost.com 1504 svchost.com 1504 svchost.com 1564 svchost.com 1564 svchost.com 1164 svchost.com 1164 svchost.com 1488 svchost.com -
Drops file in Program Files directory 64 IoCs
Processes:
d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exed778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exedescription ioc process File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe -
Drops file in Windows directory 64 IoCs
Processes:
D778AB~1.EXEsvchost.comsvchost.comsvchost.comD778AB~1.EXED778AB~1.EXEsvchost.comD778AB~1.EXED778AB~1.EXEsvchost.comsvchost.comsvchost.comD778AB~1.EXED778AB~1.EXED778AB~1.EXEsvchost.comsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXED778AB~1.EXEsvchost.comD778AB~1.EXED778AB~1.EXED778AB~1.EXEsvchost.comsvchost.comD778AB~1.EXEsvchost.comdescription ioc process File opened for modification C:\Windows\svchost.com D778AB~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com D778AB~1.EXE File opened for modification C:\Windows\svchost.com D778AB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys D778AB~1.EXE File opened for modification C:\Windows\directx.sys D778AB~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com D778AB~1.EXE File opened for modification C:\Windows\directx.sys D778AB~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys D778AB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys D778AB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys D778AB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys D778AB~1.EXE File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys D778AB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com D778AB~1.EXE File opened for modification C:\Windows\svchost.com D778AB~1.EXE File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com D778AB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\directx.sys File opened for modification C:\Windows\svchost.com File opened for modification C:\Windows\svchost.com D778AB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exed778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exesvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comD778AB~1.EXEsvchost.comsvchost.comdescription pid process target process PID 792 wrote to memory of 772 792 d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe PID 792 wrote to memory of 772 792 d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe PID 792 wrote to memory of 772 792 d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe PID 792 wrote to memory of 772 792 d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe PID 772 wrote to memory of 468 772 d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe svchost.com PID 772 wrote to memory of 468 772 d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe svchost.com PID 772 wrote to memory of 468 772 d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe svchost.com PID 772 wrote to memory of 468 772 d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe svchost.com PID 468 wrote to memory of 1760 468 svchost.com D778AB~1.EXE PID 468 wrote to memory of 1760 468 svchost.com D778AB~1.EXE PID 468 wrote to memory of 1760 468 svchost.com D778AB~1.EXE PID 468 wrote to memory of 1760 468 svchost.com D778AB~1.EXE PID 1760 wrote to memory of 1636 1760 D778AB~1.EXE svchost.com PID 1760 wrote to memory of 1636 1760 D778AB~1.EXE svchost.com PID 1760 wrote to memory of 1636 1760 D778AB~1.EXE svchost.com PID 1760 wrote to memory of 1636 1760 D778AB~1.EXE svchost.com PID 1636 wrote to memory of 892 1636 svchost.com D778AB~1.EXE PID 1636 wrote to memory of 892 1636 svchost.com D778AB~1.EXE PID 1636 wrote to memory of 892 1636 svchost.com D778AB~1.EXE PID 1636 wrote to memory of 892 1636 svchost.com D778AB~1.EXE PID 892 wrote to memory of 2016 892 D778AB~1.EXE svchost.com PID 892 wrote to memory of 2016 892 D778AB~1.EXE svchost.com PID 892 wrote to memory of 2016 892 D778AB~1.EXE svchost.com PID 892 wrote to memory of 2016 892 D778AB~1.EXE svchost.com PID 2016 wrote to memory of 624 2016 svchost.com D778AB~1.EXE PID 2016 wrote to memory of 624 2016 svchost.com D778AB~1.EXE PID 2016 wrote to memory of 624 2016 svchost.com D778AB~1.EXE PID 2016 wrote to memory of 624 2016 svchost.com D778AB~1.EXE PID 624 wrote to memory of 1168 624 D778AB~1.EXE svchost.com PID 624 wrote to memory of 1168 624 D778AB~1.EXE svchost.com PID 624 wrote to memory of 1168 624 D778AB~1.EXE svchost.com PID 624 wrote to memory of 1168 624 D778AB~1.EXE svchost.com PID 1168 wrote to memory of 1872 1168 svchost.com D778AB~1.EXE PID 1168 wrote to memory of 1872 1168 svchost.com D778AB~1.EXE PID 1168 wrote to memory of 1872 1168 svchost.com D778AB~1.EXE PID 1168 wrote to memory of 1872 1168 svchost.com D778AB~1.EXE PID 1872 wrote to memory of 960 1872 D778AB~1.EXE svchost.com PID 1872 wrote to memory of 960 1872 D778AB~1.EXE svchost.com PID 1872 wrote to memory of 960 1872 D778AB~1.EXE svchost.com PID 1872 wrote to memory of 960 1872 D778AB~1.EXE svchost.com PID 960 wrote to memory of 944 960 svchost.com D778AB~1.EXE PID 960 wrote to memory of 944 960 svchost.com D778AB~1.EXE PID 960 wrote to memory of 944 960 svchost.com D778AB~1.EXE PID 960 wrote to memory of 944 960 svchost.com D778AB~1.EXE PID 944 wrote to memory of 1428 944 D778AB~1.EXE svchost.com PID 944 wrote to memory of 1428 944 D778AB~1.EXE svchost.com PID 944 wrote to memory of 1428 944 D778AB~1.EXE svchost.com PID 944 wrote to memory of 1428 944 D778AB~1.EXE svchost.com PID 1428 wrote to memory of 1832 1428 svchost.com D778AB~1.EXE PID 1428 wrote to memory of 1832 1428 svchost.com D778AB~1.EXE PID 1428 wrote to memory of 1832 1428 svchost.com D778AB~1.EXE PID 1428 wrote to memory of 1832 1428 svchost.com D778AB~1.EXE PID 1832 wrote to memory of 1772 1832 D778AB~1.EXE svchost.com PID 1832 wrote to memory of 1772 1832 D778AB~1.EXE svchost.com PID 1832 wrote to memory of 1772 1832 D778AB~1.EXE svchost.com PID 1832 wrote to memory of 1772 1832 D778AB~1.EXE svchost.com PID 1772 wrote to memory of 1164 1772 svchost.com D778AB~1.EXE PID 1772 wrote to memory of 1164 1772 svchost.com D778AB~1.EXE PID 1772 wrote to memory of 1164 1772 svchost.com D778AB~1.EXE PID 1772 wrote to memory of 1164 1772 svchost.com D778AB~1.EXE PID 1748 wrote to memory of 1404 1748 svchost.com D778AB~1.EXE PID 1748 wrote to memory of 1404 1748 svchost.com D778AB~1.EXE PID 1748 wrote to memory of 1404 1748 svchost.com D778AB~1.EXE PID 1748 wrote to memory of 1404 1748 svchost.com D778AB~1.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe"C:\Users\Admin\AppData\Local\Temp\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\d778ab965f0e5b72c454af87e07fbc0c7128683c972bc070af4f87052879beff.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE16⤵
- Executes dropped EXE
PID:1164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE18⤵
- Executes dropped EXE
PID:1404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE20⤵
- Executes dropped EXE
PID:468 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE22⤵
- Executes dropped EXE
PID:1660 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE24⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1420 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE26⤵
- Executes dropped EXE
PID:624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE28⤵
- Executes dropped EXE
PID:1680 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE30⤵
- Executes dropped EXE
PID:1204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE32⤵
- Executes dropped EXE
PID:1612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE34⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE36⤵
- Executes dropped EXE
PID:1096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE38⤵
- Executes dropped EXE
PID:660 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE40⤵
- Executes dropped EXE
PID:1704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE42⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:896 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE44⤵
- Executes dropped EXE
PID:1912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE46⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE48⤵
- Executes dropped EXE
PID:1940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE50⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE52⤵
- Executes dropped EXE
PID:1116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE54⤵
- Executes dropped EXE
PID:1168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE56⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE58⤵
- Executes dropped EXE
PID:1428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE60⤵
- Executes dropped EXE
PID:1832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE17⤵
- Executes dropped EXE
PID:1576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"18⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE19⤵
- Executes dropped EXE
PID:924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"20⤵
- Executes dropped EXE
PID:108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE21⤵PID:1924
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"22⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE23⤵PID:1884
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"24⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE25⤵PID:1816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"26⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE27⤵PID:1056
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"28⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE29⤵PID:1380
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"30⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE31⤵PID:2024
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"32⤵PID:1872
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE33⤵PID:1008
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"34⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE35⤵PID:1480
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"36⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE37⤵PID:988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"38⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE39⤵PID:1080
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"40⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE41⤵PID:940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"42⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE43⤵PID:1180
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"44⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE45⤵PID:1576
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"46⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE47⤵PID:1496
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"48⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE49⤵PID:1544
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"50⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE51⤵PID:1636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"52⤵
- Drops file in Windows directory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE53⤵PID:892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"54⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE55⤵PID:1540
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"56⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE57⤵PID:1552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"58⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE59⤵PID:1640
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"60⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE61⤵PID:1804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"62⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE63⤵
- Drops file in Windows directory
PID:1632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"64⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE65⤵
- Drops file in Windows directory
PID:1480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"66⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE67⤵PID:1956
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"68⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE69⤵PID:1076
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"70⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE71⤵PID:1720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"72⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE73⤵PID:900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"74⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE75⤵PID:660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"76⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE77⤵PID:1484
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"78⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE79⤵PID:1844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"80⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE81⤵PID:468
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"82⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE83⤵PID:552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"84⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE85⤵PID:1540
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"86⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE87⤵PID:1552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"88⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE89⤵PID:1640
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"90⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE91⤵PID:1804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"92⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE93⤵PID:812
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"94⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE95⤵PID:1716
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"96⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE97⤵PID:1080
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"98⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE99⤵PID:940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"100⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE101⤵PID:1180
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"102⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE103⤵PID:1704
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"104⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE48⤵PID:1928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"49⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE50⤵PID:672
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"51⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE52⤵PID:1816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"53⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE54⤵PID:1864
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"55⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE56⤵PID:624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"57⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE58⤵PID:1608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"59⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE60⤵PID:1960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"61⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE62⤵PID:1008
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"63⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE64⤵PID:316
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"65⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE66⤵PID:1400
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"67⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE68⤵PID:1160
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"69⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE70⤵
- Drops file in Windows directory
PID:1120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"71⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE72⤵PID:1724
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"73⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE74⤵PID:1576
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"75⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE76⤵PID:1704
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"77⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE78⤵PID:1928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"79⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE80⤵PID:1844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"81⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE82⤵PID:1816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"83⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE84⤵PID:1548
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"85⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE86⤵PID:1680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"87⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE88⤵PID:1116
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"89⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE90⤵PID:980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"91⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE92⤵PID:1612
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"93⤵
- Drops file in Windows directory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE94⤵PID:1568
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"95⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE96⤵PID:1532
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"97⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE98⤵PID:1104
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"99⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE100⤵PID:1096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"101⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE102⤵PID:660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"103⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE104⤵PID:1756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"105⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE106⤵PID:1660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"107⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE108⤵PID:468
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"109⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE110⤵PID:1800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"111⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE112⤵PID:552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"113⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE114⤵PID:1540
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"115⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE116⤵PID:1552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"117⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE118⤵PID:1008
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"119⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE120⤵PID:960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"121⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE122⤵PID:812
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"123⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE124⤵PID:1400
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"125⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE126⤵PID:1120
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"127⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE128⤵PID:1720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"129⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE130⤵PID:1592
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"131⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE132⤵PID:296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"133⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE134⤵PID:840
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"135⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE136⤵PID:1844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"137⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE138⤵PID:1864
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"139⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE140⤵PID:624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"141⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE142⤵PID:1608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"143⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE144⤵PID:428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"145⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE146⤵PID:1996
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"147⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE148⤵PID:1092
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"149⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE150⤵PID:988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"151⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE152⤵PID:1080
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"153⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE154⤵PID:1588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"155⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE156⤵PID:1752
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"157⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE158⤵PID:1488
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"159⤵
- Drops file in Windows directory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE160⤵PID:1748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"161⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE162⤵PID:1760
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"163⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE164⤵PID:672
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"165⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE166⤵PID:1424
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"167⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE168⤵PID:1548
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"169⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE170⤵PID:1980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"171⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE172⤵PID:1072
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"173⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE174⤵PID:1168
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"175⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE176⤵PID:960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"177⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE178⤵PID:812
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"179⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE180⤵PID:1772
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"181⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE182⤵PID:1596
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"183⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE184⤵PID:1720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"185⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE186⤵PID:1592
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"187⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE188⤵PID:296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"189⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE190⤵PID:1900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"191⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE192⤵PID:1664
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"193⤵
- Drops file in Windows directory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE194⤵PID:532
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"195⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE196⤵PID:2016
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"197⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE198⤵PID:552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"199⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE1⤵PID:1692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"2⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE3⤵PID:1380
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"4⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE5⤵PID:1808
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"6⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE7⤵PID:1804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"8⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE9⤵PID:604
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"10⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE11⤵PID:1068
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"12⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE13⤵PID:1080
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"14⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE15⤵PID:1596
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"16⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE17⤵PID:1484
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"18⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE19⤵PID:1088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"20⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE21⤵PID:1924
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"22⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE23⤵PID:1572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"24⤵
- Drops file in Windows directory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE25⤵PID:1492
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"26⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE27⤵PID:1800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"28⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE29⤵PID:1424
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"30⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE31⤵PID:1940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"32⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE33⤵PID:1872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"34⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE35⤵PID:1640
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"36⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE37⤵PID:1504
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"38⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE39⤵PID:1428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"40⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE41⤵PID:1532
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"42⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE43⤵PID:1564
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"44⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE45⤵PID:1080
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"46⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE47⤵PID:1720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"48⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE49⤵PID:992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"50⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE51⤵PID:1088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"52⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE53⤵PID:1924
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"54⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE55⤵PID:1496
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"56⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE57⤵PID:1492
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"58⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE59⤵PID:1800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"60⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE61⤵PID:552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"62⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE63⤵PID:1960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"64⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE65⤵PID:1872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"66⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE67⤵PID:1204
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"68⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE69⤵PID:960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"70⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE71⤵PID:1888
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"72⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE73⤵PID:1300
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"74⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE75⤵PID:1084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"76⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE77⤵PID:1180
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"78⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE79⤵PID:1592
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"80⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE81⤵PID:1668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"82⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE83⤵PID:1404
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"84⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE73⤵PID:960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"74⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE75⤵PID:1096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"76⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE77⤵
- Drops file in Windows directory
PID:1160 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"78⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE79⤵PID:1756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"80⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE81⤵PID:1592
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"82⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE83⤵PID:1924
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"84⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE85⤵
- Drops file in Windows directory
PID:1404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"86⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE87⤵PID:1744
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"88⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE89⤵PID:1736
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"90⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE91⤵PID:1844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"92⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE93⤵PID:552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"94⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE95⤵PID:1928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"96⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE97⤵PID:1168
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"98⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE99⤵PID:1608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"100⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE101⤵PID:1804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"102⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE103⤵PID:1428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"104⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE83⤵PID:1728
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"84⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE85⤵PID:1896
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"86⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE87⤵PID:1892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"88⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE89⤵PID:1816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"90⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE91⤵PID:1100
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"92⤵
- Drops file in Windows directory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE93⤵PID:468
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"94⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE95⤵PID:1056
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"96⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE97⤵PID:604
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"98⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE99⤵PID:1680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"100⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE101⤵PID:940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"102⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE103⤵PID:364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"104⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE105⤵PID:900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"106⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE107⤵PID:1772
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"108⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE109⤵
- Drops file in Windows directory
PID:1484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"110⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE111⤵PID:1564
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"112⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE113⤵PID:1924
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"114⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE115⤵PID:896
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"116⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE117⤵PID:840
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"118⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE119⤵PID:1496
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"120⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE121⤵PID:1552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"122⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE123⤵
- Drops file in Windows directory
PID:428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"124⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE125⤵PID:316
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"126⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE127⤵PID:1812
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"128⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE129⤵PID:1808
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"130⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE131⤵PID:1996
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"132⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE133⤵PID:1888
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"134⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE135⤵PID:1376
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"136⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE137⤵PID:900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"138⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE139⤵PID:1080
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"140⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE141⤵PID:1484
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"142⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE143⤵PID:1664
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"144⤵
- Drops file in Windows directory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE145⤵PID:1984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"146⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE147⤵PID:1896
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"148⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE149⤵PID:1892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"150⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE151⤵PID:1816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"152⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE153⤵PID:1988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"154⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE155⤵PID:468
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"156⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE157⤵PID:1872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"158⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE159⤵PID:604
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"160⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE161⤵PID:1504
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"162⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE163⤵PID:1680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"164⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE165⤵PID:940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"166⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE167⤵PID:1716
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"168⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE169⤵PID:1752
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"170⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE171⤵PID:1588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"172⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE173⤵PID:964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"174⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE175⤵PID:1900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"176⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE177⤵PID:108
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"178⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE179⤵PID:928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"180⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE181⤵PID:1844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"182⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE183⤵PID:624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"184⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE185⤵PID:1072
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"186⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE187⤵PID:1928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"188⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE189⤵PID:1568
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"190⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE191⤵PID:1532
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"192⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE193⤵PID:1624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"194⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE195⤵PID:1608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"196⤵
- Drops file in Windows directory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE197⤵PID:1160
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"198⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE199⤵PID:660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"200⤵PID:900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE201⤵PID:1592
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"202⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE203⤵PID:1572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"204⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE205⤵PID:884
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"206⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE207⤵PID:1664
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"208⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE209⤵PID:1580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"210⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE211⤵PID:1652
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"212⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE213⤵PID:1892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"214⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE215⤵PID:1736
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"216⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE217⤵PID:1204
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"218⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE219⤵PID:1640
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"220⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE221⤵PID:988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"222⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE223⤵PID:1056
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"224⤵PID:1180
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE225⤵PID:536
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"226⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE227⤵PID:980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"228⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE229⤵PID:940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"230⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE21⤵PID:1084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"22⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE23⤵PID:1096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"24⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE25⤵PID:1720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"26⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE27⤵PID:1972
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"28⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE29⤵PID:1744
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"30⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE31⤵PID:108
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"32⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE33⤵PID:676
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"34⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE35⤵PID:1632
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"36⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE37⤵
- Drops file in Windows directory
PID:624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"38⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE39⤵PID:2024
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"40⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE41⤵PID:1928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"42⤵
- Drops file in Windows directory
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE43⤵PID:1196
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"44⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE45⤵PID:1532
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"46⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE47⤵PID:1180
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"48⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE49⤵PID:1120
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"50⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE51⤵PID:1756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"52⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE53⤵PID:760
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"54⤵
- Drops file in Windows directory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE55⤵PID:992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"56⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE57⤵PID:1748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"58⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE59⤵PID:1920
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"60⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE61⤵PID:1972
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"62⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE63⤵PID:1744
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"64⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE65⤵PID:108
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"66⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE67⤵PID:1580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"68⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE69⤵PID:1652
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"70⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE71⤵PID:552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"72⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE73⤵PID:1072
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"74⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE75⤵PID:1168
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"76⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE77⤵PID:1400
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"78⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE79⤵PID:1056
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"80⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE81⤵PID:536
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"82⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE83⤵PID:1068
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"84⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE85⤵PID:1660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"86⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE87⤵PID:364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"88⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE89⤵PID:960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"90⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE91⤵PID:1476
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"92⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE93⤵PID:1920
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"94⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE95⤵PID:884
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"96⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE97⤵PID:1668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"98⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE99⤵PID:1692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"100⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE101⤵PID:1540
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"102⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE103⤵PID:1552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"104⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE105⤵PID:860
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"106⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE107⤵PID:1980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"108⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE109⤵PID:1872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"110⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE111⤵PID:1596
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"112⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE113⤵PID:1724
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"114⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE115⤵PID:600
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"116⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE117⤵PID:1120
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"118⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE119⤵PID:1428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"120⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE121⤵
- Drops file in Windows directory
PID:1616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"122⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE123⤵PID:1088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"124⤵
- Drops file in Windows directory
PID:1544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE1⤵PID:928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"2⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE3⤵PID:676
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"4⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE5⤵PID:892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"6⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE7⤵PID:1424
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"8⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE9⤵PID:552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"10⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE11⤵PID:1960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"12⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE13⤵PID:1168
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"14⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE15⤵PID:1504
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"16⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE17⤵PID:1076
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"18⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE19⤵PID:1888
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"20⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE21⤵PID:924
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"22⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE23⤵PID:1084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"24⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE25⤵PID:1588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"26⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE27⤵PID:1660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"28⤵PID:740
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE29⤵PID:1920
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"30⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE31⤵PID:1992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"32⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE33⤵PID:928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"34⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE35⤵PID:1892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"36⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE37⤵PID:1800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"38⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE39⤵PID:1424
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"40⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE41⤵PID:1996
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"42⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE43⤵PID:1612
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"44⤵PID:860
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE45⤵PID:1804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"46⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE47⤵PID:364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"48⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE49⤵PID:1400
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"50⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE51⤵PID:1832
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"52⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE53⤵PID:1596
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"54⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE55⤵PID:660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"56⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE57⤵PID:296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"58⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE59⤵PID:1924
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"60⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE61⤵PID:1748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"62⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE63⤵PID:1952
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"64⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE65⤵PID:1816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"66⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE67⤵PID:1420
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"68⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE69⤵PID:1864
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"70⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE71⤵PID:1116
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"72⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE73⤵PID:1072
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"74⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE75⤵PID:1640
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"76⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE77⤵PID:812
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"78⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE79⤵PID:1888
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"80⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE81⤵PID:924
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"82⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE83⤵PID:1564
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"84⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE85⤵PID:1756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"86⤵
- Drops file in Windows directory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE87⤵PID:1268
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"88⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE89⤵PID:1668
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"90⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE91⤵PID:108
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"92⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE93⤵PID:1744
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"94⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE95⤵PID:1892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"96⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE97⤵PID:468
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"98⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE99⤵PID:1940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"100⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE101⤵PID:1608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"102⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE103⤵PID:1960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"104⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE105⤵PID:860
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"106⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE107⤵PID:960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"108⤵PID:364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE109⤵PID:1716
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"110⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE111⤵PID:1620
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"112⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE113⤵PID:600
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"114⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE115⤵PID:992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"116⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE117⤵PID:1660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"118⤵PID:1268
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE119⤵
- Drops file in Windows directory
PID:1920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"120⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE121⤵PID:1748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"122⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE123⤵PID:1052
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"124⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE125⤵PID:1844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"126⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE127⤵PID:1800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"128⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE129⤵PID:552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"130⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE131⤵PID:1980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"132⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE133⤵PID:1380
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"134⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE135⤵PID:1008
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"136⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE137⤵PID:980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"138⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE139⤵PID:988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"140⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE141⤵PID:1300
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"142⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE143⤵PID:1724
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"144⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE145⤵PID:1752
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"146⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE147⤵PID:296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"148⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE149⤵PID:964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"150⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE151⤵PID:1920
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"152⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE153⤵PID:928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"154⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE155⤵PID:1736
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"156⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE157⤵PID:1560
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"158⤵
- Drops file in Windows directory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE159⤵PID:1100
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"160⤵PID:1424
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE161⤵PID:1928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"162⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE163⤵PID:1680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"164⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE165⤵PID:816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"166⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE167⤵PID:1008
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"168⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE169⤵PID:1428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"170⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE171⤵PID:812
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"172⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE173⤵PID:940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"174⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE175⤵PID:600
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"176⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE177⤵PID:1772
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"178⤵PID:660
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE179⤵PID:1592
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"180⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE181⤵PID:1616
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"182⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE183⤵PID:1572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"184⤵PID:108
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE185⤵PID:928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"186⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE187⤵PID:840
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"188⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE189⤵PID:1560
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"190⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE191⤵PID:1100
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"192⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE193⤵PID:1056
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"194⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE195⤵PID:1248
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"196⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE197⤵PID:1608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"198⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE199⤵PID:1804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"200⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE201⤵
- Drops file in Windows directory
PID:1428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"202⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE181⤵PID:1488
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"182⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE183⤵PID:1920
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"184⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE185⤵PID:1984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"186⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE187⤵PID:892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"188⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE189⤵PID:1672
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"190⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE191⤵PID:1712
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"192⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE193⤵PID:1864
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"194⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE195⤵PID:552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"196⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE197⤵PID:2016
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"198⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE199⤵PID:816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"200⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE201⤵PID:1104
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"202⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE203⤵PID:1680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"204⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE205⤵PID:1116
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"206⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE207⤵PID:980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"208⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE209⤵PID:1084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"210⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE211⤵PID:760
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"212⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE213⤵PID:296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"214⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE215⤵PID:1080
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"216⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE217⤵PID:1992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"218⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE219⤵PID:532
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"220⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE221⤵PID:1424
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"222⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE223⤵PID:1844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"224⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE225⤵PID:1936
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"226⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE227⤵PID:1816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"228⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE229⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE141⤵PID:1068
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"142⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE143⤵PID:1080
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"144⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE145⤵
- Drops file in Windows directory
PID:1720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"146⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE147⤵PID:1576
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"148⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE149⤵PID:660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"150⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE151⤵PID:1748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"152⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE153⤵PID:1572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"154⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE155⤵PID:1892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"156⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE157⤵PID:1284
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"158⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE159⤵PID:1864
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"160⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE161⤵PID:552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"162⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE163⤵PID:1056
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"164⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE165⤵PID:1380
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"166⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE167⤵PID:1608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"168⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE169⤵PID:1888
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"170⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE171⤵PID:1428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"172⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE173⤵PID:1096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"174⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE175⤵PID:1876
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"176⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE177⤵PID:1088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"178⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE179⤵PID:1488
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"180⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE181⤵PID:1492
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"182⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE183⤵PID:1896
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"184⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE185⤵PID:1636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"186⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE187⤵PID:1736
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"188⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE189⤵PID:624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"190⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE191⤵
- Drops file in Windows directory
PID:468 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"192⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE193⤵PID:552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"194⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE195⤵PID:1248
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"196⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE197⤵PID:1996
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"198⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE199⤵PID:1612
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"200⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE201⤵PID:364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"202⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE203⤵PID:1428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"204⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE205⤵PID:1096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"206⤵PID:1080
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE207⤵PID:1876
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"208⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE209⤵PID:1088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"210⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE211⤵PID:1488
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"212⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE213⤵PID:1728
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"214⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE215⤵PID:1896
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"216⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE217⤵PID:1712
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"218⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE219⤵PID:1816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"220⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE221⤵PID:1100
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"222⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE223⤵
- Drops file in Windows directory
PID:1988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"224⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE225⤵PID:1940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"226⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE227⤵PID:988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"228⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE229⤵PID:1104
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"230⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE231⤵PID:1888
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"232⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE233⤵PID:364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"234⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE235⤵PID:1832
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"236⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE237⤵PID:1096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"238⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE239⤵PID:1576
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE"240⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D778AB~1.EXE241⤵PID:1088
-