Analysis
-
max time kernel
256s -
max time network
335s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
29-11-2022 08:05
Behavioral task
behavioral1
Sample
401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe
Resource
win10v2004-20221111-en
General
-
Target
401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe
-
Size
1.7MB
-
MD5
985212c812553ac86508c65e6c56d81c
-
SHA1
3c6f0d2384a4d5d167e23ee5988409491a92ed5d
-
SHA256
401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d
-
SHA512
ac066f904f1666f930b327bcff5ab3adc60ef23cab3ae5fd315fcef654c6d10d47b44a73f026792d93f82f67255d30f7e7d54738208c16b9ce0b8f84930a2784
-
SSDEEP
24576:rqd57u9q281f9OVB2ZzvowJiMPml4gGnjHSZUu8R1:w576Vhw7ml4zj5R
Malware Config
Signatures
-
Detect Neshta payload 47 IoCs
resource yara_rule behavioral1/files/0x0009000000012687-55.dat family_neshta behavioral1/files/0x0009000000012687-58.dat family_neshta behavioral1/files/0x0009000000012687-56.dat family_neshta behavioral1/files/0x0009000000012687-60.dat family_neshta behavioral1/files/0x0008000000012701-61.dat family_neshta behavioral1/files/0x0008000000012701-63.dat family_neshta behavioral1/files/0x0009000000012687-65.dat family_neshta behavioral1/files/0x0009000000012687-66.dat family_neshta behavioral1/files/0x00080000000104ac-67.dat family_neshta behavioral1/files/0x000400000001047e-68.dat family_neshta behavioral1/files/0x0009000000012687-70.dat family_neshta behavioral1/files/0x0001000000010316-72.dat family_neshta behavioral1/files/0x0008000000012701-75.dat family_neshta behavioral1/files/0x0009000000012687-78.dat family_neshta behavioral1/files/0x0009000000012687-79.dat family_neshta behavioral1/files/0x0009000000012687-81.dat family_neshta behavioral1/files/0x0008000000012701-85.dat family_neshta behavioral1/files/0x0009000000012687-88.dat family_neshta behavioral1/files/0x0009000000012687-89.dat family_neshta behavioral1/files/0x0009000000012687-91.dat family_neshta behavioral1/files/0x0008000000012701-95.dat family_neshta behavioral1/files/0x0009000000012687-98.dat family_neshta behavioral1/files/0x0009000000012687-99.dat family_neshta behavioral1/files/0x0009000000012687-101.dat family_neshta behavioral1/files/0x0008000000012701-105.dat family_neshta behavioral1/files/0x0009000000012687-108.dat family_neshta behavioral1/files/0x0009000000012687-109.dat family_neshta behavioral1/files/0x0009000000012687-111.dat family_neshta behavioral1/files/0x0008000000012701-115.dat family_neshta behavioral1/files/0x0009000000012687-118.dat family_neshta behavioral1/files/0x0009000000012687-119.dat family_neshta behavioral1/files/0x0009000000012687-121.dat family_neshta behavioral1/files/0x0008000000012701-125.dat family_neshta behavioral1/files/0x0009000000012687-128.dat family_neshta behavioral1/files/0x0009000000012687-129.dat family_neshta behavioral1/files/0x0009000000012687-131.dat family_neshta behavioral1/files/0x0008000000012701-135.dat family_neshta behavioral1/files/0x0009000000012687-136.dat family_neshta behavioral1/files/0x0009000000012687-137.dat family_neshta behavioral1/files/0x0009000000012687-138.dat family_neshta behavioral1/files/0x0008000000012701-142.dat family_neshta behavioral1/files/0x0009000000012687-145.dat family_neshta behavioral1/files/0x0009000000012687-146.dat family_neshta behavioral1/files/0x0009000000012687-148.dat family_neshta behavioral1/files/0x0008000000012701-152.dat family_neshta behavioral1/files/0x0009000000012687-155.dat family_neshta behavioral1/files/0x0009000000012687-156.dat family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
pid Process 1160 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 768 svchost.com 1684 401772~1.EXE 992 svchost.com 1624 401772~1.EXE 1892 svchost.com 2020 401772~1.EXE 972 svchost.com 1220 401772~1.EXE 1348 svchost.com 1392 401772~1.EXE 1884 svchost.com 1700 401772~1.EXE 1692 svchost.com 1928 401772~1.EXE 288 svchost.com 1592 401772~1.EXE 1880 svchost.com 1204 401772~1.EXE 1344 svchost.com 1684 401772~1.EXE 1704 svchost.com 1064 401772~1.EXE 1624 svchost.com 432 401772~1.EXE 284 svchost.com 1636 401772~1.EXE 836 svchost.com 336 401772~1.EXE 912 svchost.com 1308 401772~1.EXE 1632 svchost.com 2044 401772~1.EXE 900 svchost.com 1072 401772~1.EXE 1884 svchost.com 1700 401772~1.EXE 1960 svchost.com 1692 401772~1.EXE 1696 svchost.com 1948 401772~1.EXE 1600 svchost.com 1592 401772~1.EXE 1528 svchost.com 1204 401772~1.EXE 1272 svchost.com 1344 401772~1.EXE 1952 svchost.com 924 401772~1.EXE 1844 svchost.com 1624 401772~1.EXE 532 svchost.com 284 401772~1.EXE 1708 svchost.com 1368 401772~1.EXE 1976 svchost.com 1728 401772~1.EXE 1216 svchost.com 1336 401772~1.EXE 2012 svchost.com 1072 401772~1.EXE 1884 svchost.com 1700 401772~1.EXE 592 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 428 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 428 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 768 svchost.com 768 svchost.com 992 svchost.com 992 svchost.com 1892 svchost.com 1892 svchost.com 972 svchost.com 972 svchost.com 1348 svchost.com 1348 svchost.com 1884 svchost.com 1884 svchost.com 1692 svchost.com 1692 svchost.com 288 svchost.com 288 svchost.com 1880 svchost.com 1880 svchost.com 1344 svchost.com 1344 svchost.com 1704 svchost.com 1704 svchost.com 1624 svchost.com 1624 svchost.com 284 svchost.com 284 svchost.com 836 svchost.com 836 svchost.com 912 svchost.com 912 svchost.com 1632 svchost.com 1632 svchost.com 900 svchost.com 900 svchost.com 1884 svchost.com 1884 svchost.com 1960 svchost.com 1960 svchost.com 1696 svchost.com 1696 svchost.com 1600 svchost.com 1600 svchost.com 1528 svchost.com 1528 svchost.com 1272 svchost.com 1272 svchost.com 1952 svchost.com 1952 svchost.com 1844 svchost.com 1844 svchost.com 532 svchost.com 532 svchost.com 1708 svchost.com 1708 svchost.com 1976 svchost.com 1976 svchost.com 1216 svchost.com 1216 svchost.com 2012 svchost.com 2012 svchost.com 1884 svchost.com 1884 svchost.com -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\directx.sys Process not Found File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com Process not Found File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\svchost.com 401772~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 428 wrote to memory of 1160 428 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 28 PID 428 wrote to memory of 1160 428 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 28 PID 428 wrote to memory of 1160 428 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 28 PID 428 wrote to memory of 1160 428 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 28 PID 1160 wrote to memory of 768 1160 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 29 PID 1160 wrote to memory of 768 1160 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 29 PID 1160 wrote to memory of 768 1160 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 29 PID 1160 wrote to memory of 768 1160 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 29 PID 768 wrote to memory of 1684 768 svchost.com 30 PID 768 wrote to memory of 1684 768 svchost.com 30 PID 768 wrote to memory of 1684 768 svchost.com 30 PID 768 wrote to memory of 1684 768 svchost.com 30 PID 1684 wrote to memory of 992 1684 401772~1.EXE 31 PID 1684 wrote to memory of 992 1684 401772~1.EXE 31 PID 1684 wrote to memory of 992 1684 401772~1.EXE 31 PID 1684 wrote to memory of 992 1684 401772~1.EXE 31 PID 992 wrote to memory of 1624 992 svchost.com 32 PID 992 wrote to memory of 1624 992 svchost.com 32 PID 992 wrote to memory of 1624 992 svchost.com 32 PID 992 wrote to memory of 1624 992 svchost.com 32 PID 1624 wrote to memory of 1892 1624 401772~1.EXE 33 PID 1624 wrote to memory of 1892 1624 401772~1.EXE 33 PID 1624 wrote to memory of 1892 1624 401772~1.EXE 33 PID 1624 wrote to memory of 1892 1624 401772~1.EXE 33 PID 1892 wrote to memory of 2020 1892 svchost.com 34 PID 1892 wrote to memory of 2020 1892 svchost.com 34 PID 1892 wrote to memory of 2020 1892 svchost.com 34 PID 1892 wrote to memory of 2020 1892 svchost.com 34 PID 2020 wrote to memory of 972 2020 401772~1.EXE 35 PID 2020 wrote to memory of 972 2020 401772~1.EXE 35 PID 2020 wrote to memory of 972 2020 401772~1.EXE 35 PID 2020 wrote to memory of 972 2020 401772~1.EXE 35 PID 972 wrote to memory of 1220 972 svchost.com 36 PID 972 wrote to memory of 1220 972 svchost.com 36 PID 972 wrote to memory of 1220 972 svchost.com 36 PID 972 wrote to memory of 1220 972 svchost.com 36 PID 1220 wrote to memory of 1348 1220 401772~1.EXE 37 PID 1220 wrote to memory of 1348 1220 401772~1.EXE 37 PID 1220 wrote to memory of 1348 1220 401772~1.EXE 37 PID 1220 wrote to memory of 1348 1220 401772~1.EXE 37 PID 1348 wrote to memory of 1392 1348 svchost.com 38 PID 1348 wrote to memory of 1392 1348 svchost.com 38 PID 1348 wrote to memory of 1392 1348 svchost.com 38 PID 1348 wrote to memory of 1392 1348 svchost.com 38 PID 1392 wrote to memory of 1884 1392 401772~1.EXE 39 PID 1392 wrote to memory of 1884 1392 401772~1.EXE 39 PID 1392 wrote to memory of 1884 1392 401772~1.EXE 39 PID 1392 wrote to memory of 1884 1392 401772~1.EXE 39 PID 1884 wrote to memory of 1700 1884 svchost.com 40 PID 1884 wrote to memory of 1700 1884 svchost.com 40 PID 1884 wrote to memory of 1700 1884 svchost.com 40 PID 1884 wrote to memory of 1700 1884 svchost.com 40 PID 1700 wrote to memory of 1692 1700 401772~1.EXE 41 PID 1700 wrote to memory of 1692 1700 401772~1.EXE 41 PID 1700 wrote to memory of 1692 1700 401772~1.EXE 41 PID 1700 wrote to memory of 1692 1700 401772~1.EXE 41 PID 1692 wrote to memory of 1928 1692 svchost.com 42 PID 1692 wrote to memory of 1928 1692 svchost.com 42 PID 1692 wrote to memory of 1928 1692 svchost.com 42 PID 1692 wrote to memory of 1928 1692 svchost.com 42 PID 1928 wrote to memory of 288 1928 401772~1.EXE 43 PID 1928 wrote to memory of 288 1928 401772~1.EXE 43 PID 1928 wrote to memory of 288 1928 401772~1.EXE 43 PID 1928 wrote to memory of 288 1928 401772~1.EXE 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe"C:\Users\Admin\AppData\Local\Temp\401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:288 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE18⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE20⤵
- Executes dropped EXE
PID:1204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE22⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE24⤵
- Executes dropped EXE
PID:1064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE26⤵
- Executes dropped EXE
PID:432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:284 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE28⤵
- Executes dropped EXE
PID:1636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE30⤵
- Executes dropped EXE
PID:336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE32⤵
- Executes dropped EXE
PID:1308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE34⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE36⤵
- Executes dropped EXE
PID:1072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE38⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE40⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE42⤵
- Executes dropped EXE
PID:1948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE44⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE46⤵
- Executes dropped EXE
PID:1204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE48⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE50⤵
- Executes dropped EXE
PID:924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE52⤵
- Executes dropped EXE
PID:1624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE54⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE56⤵
- Executes dropped EXE
PID:1368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE58⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE60⤵
- Executes dropped EXE
PID:1336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE62⤵
- Executes dropped EXE
PID:1072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"63⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE64⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"65⤵
- Executes dropped EXE
PID:592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE66⤵PID:1692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"67⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE68⤵PID:1476
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"69⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE70⤵PID:872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"71⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE72⤵PID:932
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"73⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE74⤵PID:1552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"75⤵PID:1272
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE76⤵PID:1344
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"77⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE78⤵PID:1952
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"79⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE80⤵PID:952
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"81⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE82⤵PID:744
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"83⤵PID:532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE84⤵PID:284
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"85⤵
- Drops file in Windows directory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE86⤵PID:852
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"87⤵PID:912
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE88⤵PID:1976
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"89⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE90⤵PID:1716
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"91⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE92⤵PID:1216
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"93⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE94⤵PID:2012
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"95⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE96⤵PID:828
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"97⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE98⤵PID:288
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"99⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE100⤵PID:680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"101⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE102⤵PID:948
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"103⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE104⤵PID:1000
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"105⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE106⤵PID:1628
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"107⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE108⤵PID:992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"109⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE110⤵PID:1304
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"111⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE112⤵PID:2024
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"113⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE114⤵PID:2020
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"115⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE116⤵PID:336
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"117⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE118⤵PID:316
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"119⤵PID:308
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE120⤵PID:912
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"121⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE122⤵PID:1920
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-