Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
178s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29/11/2022, 08:05
Behavioral task
behavioral1
Sample
401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe
Resource
win10v2004-20221111-en
General
-
Target
401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe
-
Size
1.7MB
-
MD5
985212c812553ac86508c65e6c56d81c
-
SHA1
3c6f0d2384a4d5d167e23ee5988409491a92ed5d
-
SHA256
401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d
-
SHA512
ac066f904f1666f930b327bcff5ab3adc60ef23cab3ae5fd315fcef654c6d10d47b44a73f026792d93f82f67255d30f7e7d54738208c16b9ce0b8f84930a2784
-
SSDEEP
24576:rqd57u9q281f9OVB2ZzvowJiMPml4gGnjHSZUu8R1:w576Vhw7ml4zj5R
Malware Config
Signatures
-
Detect Neshta payload 35 IoCs
resource yara_rule behavioral2/files/0x0008000000023193-133.dat family_neshta behavioral2/files/0x0008000000023193-134.dat family_neshta behavioral2/files/0x0007000000023194-136.dat family_neshta behavioral2/files/0x0004000000009f80-138.dat family_neshta behavioral2/files/0x0007000000023194-137.dat family_neshta behavioral2/files/0x0008000000023193-140.dat family_neshta behavioral2/files/0x0007000000023194-142.dat family_neshta behavioral2/files/0x0008000000023193-146.dat family_neshta behavioral2/files/0x0007000000023194-148.dat family_neshta behavioral2/files/0x0008000000023193-152.dat family_neshta behavioral2/files/0x0007000000023194-154.dat family_neshta behavioral2/files/0x0008000000023193-158.dat family_neshta behavioral2/files/0x0007000000023194-160.dat family_neshta behavioral2/files/0x0008000000023193-164.dat family_neshta behavioral2/files/0x0007000000023194-166.dat family_neshta behavioral2/files/0x0008000000023193-170.dat family_neshta behavioral2/files/0x0007000000023194-172.dat family_neshta behavioral2/files/0x0008000000023193-176.dat family_neshta behavioral2/files/0x0007000000023194-178.dat family_neshta behavioral2/files/0x0008000000023193-182.dat family_neshta behavioral2/files/0x0007000000023194-184.dat family_neshta behavioral2/files/0x0008000000023193-188.dat family_neshta behavioral2/files/0x0007000000023194-190.dat family_neshta behavioral2/files/0x0008000000023193-194.dat family_neshta behavioral2/files/0x0007000000023194-196.dat family_neshta behavioral2/files/0x0008000000023193-200.dat family_neshta behavioral2/files/0x0007000000023194-202.dat family_neshta behavioral2/files/0x0008000000023193-206.dat family_neshta behavioral2/files/0x0007000000023194-208.dat family_neshta behavioral2/files/0x0008000000023193-212.dat family_neshta behavioral2/files/0x0007000000023194-214.dat family_neshta behavioral2/files/0x0008000000023193-218.dat family_neshta behavioral2/files/0x0007000000023194-221.dat family_neshta behavioral2/files/0x0008000000023193-224.dat family_neshta behavioral2/files/0x0007000000023194-226.dat family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
pid Process 5116 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 1048 svchost.com 5088 401772~1.EXE 4236 svchost.com 3512 401772~1.EXE 5044 svchost.com 4500 401772~1.EXE 4560 svchost.com 1796 401772~1.EXE 4252 svchost.com 2664 401772~1.EXE 4280 svchost.com 4380 401772~1.EXE 2436 svchost.com 3364 401772~1.EXE 4412 svchost.com 2412 401772~1.EXE 4400 svchost.com 3908 401772~1.EXE 3448 svchost.com 4392 401772~1.EXE 1464 svchost.com 2068 401772~1.EXE 3724 svchost.com 1996 401772~1.EXE 3836 svchost.com 3848 401772~1.EXE 2296 svchost.com 3564 401772~1.EXE 616 svchost.com 3636 401772~1.EXE 4040 svchost.com 1684 401772~1.EXE 2956 svchost.com 2644 401772~1.EXE 1956 svchost.com 2528 401772~1.EXE 4144 svchost.com 2232 401772~1.EXE 1420 svchost.com 1812 401772~1.EXE 1520 svchost.com 2236 401772~1.EXE 2324 svchost.com 220 401772~1.EXE 4152 svchost.com 3568 401772~1.EXE 864 svchost.com 4748 401772~1.EXE 2680 svchost.com 3620 401772~1.EXE 4724 svchost.com 1460 401772~1.EXE 2616 svchost.com 1992 401772~1.EXE 2204 svchost.com 2780 401772~1.EXE 3660 svchost.com 4460 401772~1.EXE 4656 svchost.com 4720 401772~1.EXE 4440 svchost.com 4924 401772~1.EXE 3944 svchost.com -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\Control Panel\International\Geo\Nation 401772~1.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13171~1.37\MICROS~4.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13171~1.37\MICROS~2.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13171~1.37\MICROS~2.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13171~1.37\MICROS~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13171~1.37\MICROS~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13171~1.37\MI391D~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13171~1.37\MIA062~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\directx.sys 401772~1.EXE File opened for modification C:\Windows\svchost.com 401772~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000_Classes\Local Settings 401772~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5052 wrote to memory of 5116 5052 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 83 PID 5052 wrote to memory of 5116 5052 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 83 PID 5052 wrote to memory of 5116 5052 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 83 PID 5116 wrote to memory of 1048 5116 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 84 PID 5116 wrote to memory of 1048 5116 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 84 PID 5116 wrote to memory of 1048 5116 401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe 84 PID 1048 wrote to memory of 5088 1048 svchost.com 85 PID 1048 wrote to memory of 5088 1048 svchost.com 85 PID 1048 wrote to memory of 5088 1048 svchost.com 85 PID 5088 wrote to memory of 4236 5088 401772~1.EXE 86 PID 5088 wrote to memory of 4236 5088 401772~1.EXE 86 PID 5088 wrote to memory of 4236 5088 401772~1.EXE 86 PID 4236 wrote to memory of 3512 4236 svchost.com 87 PID 4236 wrote to memory of 3512 4236 svchost.com 87 PID 4236 wrote to memory of 3512 4236 svchost.com 87 PID 3512 wrote to memory of 5044 3512 401772~1.EXE 88 PID 3512 wrote to memory of 5044 3512 401772~1.EXE 88 PID 3512 wrote to memory of 5044 3512 401772~1.EXE 88 PID 5044 wrote to memory of 4500 5044 svchost.com 89 PID 5044 wrote to memory of 4500 5044 svchost.com 89 PID 5044 wrote to memory of 4500 5044 svchost.com 89 PID 4500 wrote to memory of 4560 4500 401772~1.EXE 90 PID 4500 wrote to memory of 4560 4500 401772~1.EXE 90 PID 4500 wrote to memory of 4560 4500 401772~1.EXE 90 PID 4560 wrote to memory of 1796 4560 svchost.com 91 PID 4560 wrote to memory of 1796 4560 svchost.com 91 PID 4560 wrote to memory of 1796 4560 svchost.com 91 PID 1796 wrote to memory of 4252 1796 401772~1.EXE 92 PID 1796 wrote to memory of 4252 1796 401772~1.EXE 92 PID 1796 wrote to memory of 4252 1796 401772~1.EXE 92 PID 4252 wrote to memory of 2664 4252 svchost.com 93 PID 4252 wrote to memory of 2664 4252 svchost.com 93 PID 4252 wrote to memory of 2664 4252 svchost.com 93 PID 2664 wrote to memory of 4280 2664 401772~1.EXE 94 PID 2664 wrote to memory of 4280 2664 401772~1.EXE 94 PID 2664 wrote to memory of 4280 2664 401772~1.EXE 94 PID 4280 wrote to memory of 4380 4280 svchost.com 95 PID 4280 wrote to memory of 4380 4280 svchost.com 95 PID 4280 wrote to memory of 4380 4280 svchost.com 95 PID 4380 wrote to memory of 2436 4380 401772~1.EXE 96 PID 4380 wrote to memory of 2436 4380 401772~1.EXE 96 PID 4380 wrote to memory of 2436 4380 401772~1.EXE 96 PID 2436 wrote to memory of 3364 2436 svchost.com 97 PID 2436 wrote to memory of 3364 2436 svchost.com 97 PID 2436 wrote to memory of 3364 2436 svchost.com 97 PID 3364 wrote to memory of 4412 3364 401772~1.EXE 98 PID 3364 wrote to memory of 4412 3364 401772~1.EXE 98 PID 3364 wrote to memory of 4412 3364 401772~1.EXE 98 PID 4412 wrote to memory of 2412 4412 svchost.com 99 PID 4412 wrote to memory of 2412 4412 svchost.com 99 PID 4412 wrote to memory of 2412 4412 svchost.com 99 PID 2412 wrote to memory of 4400 2412 401772~1.EXE 100 PID 2412 wrote to memory of 4400 2412 401772~1.EXE 100 PID 2412 wrote to memory of 4400 2412 401772~1.EXE 100 PID 4400 wrote to memory of 3908 4400 svchost.com 101 PID 4400 wrote to memory of 3908 4400 svchost.com 101 PID 4400 wrote to memory of 3908 4400 svchost.com 101 PID 3908 wrote to memory of 3448 3908 401772~1.EXE 102 PID 3908 wrote to memory of 3448 3908 401772~1.EXE 102 PID 3908 wrote to memory of 3448 3908 401772~1.EXE 102 PID 3448 wrote to memory of 4392 3448 svchost.com 103 PID 3448 wrote to memory of 4392 3448 svchost.com 103 PID 3448 wrote to memory of 4392 3448 svchost.com 103 PID 4392 wrote to memory of 1464 4392 401772~1.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe"C:\Users\Admin\AppData\Local\Temp\401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\401772ae1eb988f55b89949a2590c9499edf192b6ec8969f1e7ff18751c6818d.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE20⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"23⤵
- Executes dropped EXE
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE24⤵
- Executes dropped EXE
PID:2068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"25⤵
- Executes dropped EXE
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE26⤵
- Executes dropped EXE
PID:1996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"27⤵
- Executes dropped EXE
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE28⤵
- Executes dropped EXE
PID:3848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"29⤵
- Executes dropped EXE
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE30⤵
- Executes dropped EXE
PID:3564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE32⤵
- Executes dropped EXE
PID:3636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"33⤵
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE34⤵
- Executes dropped EXE
- Checks computer location settings
PID:1684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"35⤵
- Executes dropped EXE
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE36⤵
- Executes dropped EXE
PID:2644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"37⤵
- Executes dropped EXE
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE38⤵
- Executes dropped EXE
PID:2528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"39⤵
- Executes dropped EXE
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE40⤵
- Executes dropped EXE
- Checks computer location settings
PID:2232 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"41⤵
- Executes dropped EXE
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE42⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"43⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE44⤵
- Executes dropped EXE
- Modifies registry class
PID:2236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"45⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"47⤵
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE48⤵
- Executes dropped EXE
PID:3568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"49⤵
- Executes dropped EXE
PID:864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE50⤵
- Executes dropped EXE
- Checks computer location settings
PID:4748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"51⤵
- Executes dropped EXE
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE52⤵
- Executes dropped EXE
PID:3620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"53⤵
- Executes dropped EXE
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE54⤵
- Executes dropped EXE
PID:1460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"55⤵
- Executes dropped EXE
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE56⤵
- Executes dropped EXE
- Checks computer location settings
PID:1992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"57⤵
- Executes dropped EXE
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE58⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"59⤵
- Executes dropped EXE
PID:3660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
PID:4460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"61⤵
- Executes dropped EXE
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE62⤵
- Executes dropped EXE
PID:4720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"63⤵
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE64⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"65⤵
- Executes dropped EXE
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE66⤵PID:4404
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"67⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE68⤵PID:4700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"69⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE70⤵PID:1108
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"71⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE72⤵PID:1100
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"73⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE74⤵PID:3288
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"75⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE76⤵PID:4388
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"77⤵PID:3560
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE78⤵PID:4060
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"79⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE80⤵PID:1052
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"81⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE82⤵PID:2052
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"83⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE84⤵
- Drops file in Windows directory
PID:4484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"85⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE86⤵PID:740
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"87⤵
- Drops file in Windows directory
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE88⤵PID:3376
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"89⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE90⤵PID:2644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"91⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE92⤵
- Checks computer location settings
PID:4592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"93⤵PID:4304
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE94⤵PID:1088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"95⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE96⤵PID:3616
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"97⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE98⤵
- Checks computer location settings
- Modifies registry class
PID:2948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"99⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE100⤵PID:5088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"101⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE102⤵PID:4236
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"103⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE104⤵PID:3512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"105⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE106⤵
- Checks computer location settings
PID:4748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"107⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE108⤵PID:2152
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"109⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE110⤵PID:2984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"111⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE112⤵
- Checks computer location settings
PID:4036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"113⤵PID:4280
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE114⤵PID:4380
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"115⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE116⤵PID:3364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"117⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE118⤵PID:428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"119⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE120⤵PID:2400
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE"121⤵PID:4400
-
C:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\401772~1.EXE122⤵
- Modifies registry class
PID:4924
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-