Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 04:14
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
0e126fe12f819972684ab3486bcd1018.exe
Resource
win7-20231215-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
0e126fe12f819972684ab3486bcd1018.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
0e126fe12f819972684ab3486bcd1018.exe
-
Size
24KB
-
MD5
0e126fe12f819972684ab3486bcd1018
-
SHA1
9fc90e757b3d811be4e47e7e24db9396ced2a72e
-
SHA256
cab61ef5a0eab517b148b76d18ca22da59de49b7e48e85d4f4022f2645457fc6
-
SHA512
56b27091e0495644c8facd5001b90cf262f47b431cbd6a05adcdc1dfa3294904cdfe8b336a7655ae53eeda3d832be423c6a0a7cb524141595af22fc331bf9116
-
SSDEEP
384:ebhOmmnnw7/ru/rUQZebPufrWfyy1q9HuJ9TG5n3bIxgq/NWkiNIre2G:mOmmwyxyP4ygdQ45nBq/NWkUIrg
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 836 svshost.exe 2712 svshost.exe 2784 svshost.exe 2316 svshost.exe 2100 svshost.exe 2108 svshost.exe 2728 svshost.exe 2848 svshost.exe 2580 svshost.exe 2680 svshost.exe 2112 svshost.exe 1740 svshost.exe 1300 svshost.exe 2920 svshost.exe 2964 svshost.exe 2960 svshost.exe 2968 svshost.exe 2984 svshost.exe 2816 svshost.exe 1144 svshost.exe 740 svshost.exe 1908 svshost.exe 328 svshost.exe 1972 svshost.exe 2456 svshost.exe 900 svshost.exe 1868 svshost.exe 2780 svshost.exe 1048 svshost.exe 968 svshost.exe 572 svshost.exe 560 svshost.exe 1644 svshost.exe 2896 svshost.exe 2880 svshost.exe 2888 svshost.exe 556 svshost.exe 320 svshost.exe 736 svshost.exe 1688 svshost.exe 1008 svshost.exe 1636 svshost.exe 1652 svshost.exe 2460 svshost.exe 2532 svshost.exe 2092 svshost.exe 2364 svshost.exe 1248 svshost.exe 3036 svshost.exe 2748 svshost.exe 2500 svshost.exe 2656 svshost.exe 2272 svshost.exe 1616 svshost.exe 1364 svshost.exe 2080 svshost.exe 828 svshost.exe 3016 svshost.exe 2352 svshost.exe 2436 svshost.exe 1776 svshost.exe 1100 svshost.exe 2264 svshost.exe 1220 svshost.exe -
Loads dropped DLL 64 IoCs
pid Process 2180 0e126fe12f819972684ab3486bcd1018.exe 2180 0e126fe12f819972684ab3486bcd1018.exe 836 svshost.exe 836 svshost.exe 2712 svshost.exe 2712 svshost.exe 2784 svshost.exe 2784 svshost.exe 2316 svshost.exe 2316 svshost.exe 2100 svshost.exe 2100 svshost.exe 2108 svshost.exe 2108 svshost.exe 2728 svshost.exe 2728 svshost.exe 2848 svshost.exe 2848 svshost.exe 2580 svshost.exe 2580 svshost.exe 2680 svshost.exe 2680 svshost.exe 2112 svshost.exe 2112 svshost.exe 1740 svshost.exe 1740 svshost.exe 1300 svshost.exe 1300 svshost.exe 2920 svshost.exe 2920 svshost.exe 2964 svshost.exe 2964 svshost.exe 2960 svshost.exe 2960 svshost.exe 2968 svshost.exe 2968 svshost.exe 2984 svshost.exe 2984 svshost.exe 2816 svshost.exe 2816 svshost.exe 1144 svshost.exe 1144 svshost.exe 740 svshost.exe 740 svshost.exe 1908 svshost.exe 1908 svshost.exe 328 svshost.exe 328 svshost.exe 1972 svshost.exe 1972 svshost.exe 2456 svshost.exe 2456 svshost.exe 900 svshost.exe 900 svshost.exe 1868 svshost.exe 1868 svshost.exe 2780 svshost.exe 2780 svshost.exe 1048 svshost.exe 1048 svshost.exe 968 svshost.exe 968 svshost.exe 572 svshost.exe 572 svshost.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Service Manager = "svshost.exe" svshost.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe File created C:\Windows\SysWOW64\svshost.exe svshost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 836 2180 0e126fe12f819972684ab3486bcd1018.exe 28 PID 2180 wrote to memory of 836 2180 0e126fe12f819972684ab3486bcd1018.exe 28 PID 2180 wrote to memory of 836 2180 0e126fe12f819972684ab3486bcd1018.exe 28 PID 2180 wrote to memory of 836 2180 0e126fe12f819972684ab3486bcd1018.exe 28 PID 836 wrote to memory of 2712 836 svshost.exe 31 PID 836 wrote to memory of 2712 836 svshost.exe 31 PID 836 wrote to memory of 2712 836 svshost.exe 31 PID 836 wrote to memory of 2712 836 svshost.exe 31 PID 2712 wrote to memory of 2784 2712 svshost.exe 32 PID 2712 wrote to memory of 2784 2712 svshost.exe 32 PID 2712 wrote to memory of 2784 2712 svshost.exe 32 PID 2712 wrote to memory of 2784 2712 svshost.exe 32 PID 2784 wrote to memory of 2316 2784 svshost.exe 33 PID 2784 wrote to memory of 2316 2784 svshost.exe 33 PID 2784 wrote to memory of 2316 2784 svshost.exe 33 PID 2784 wrote to memory of 2316 2784 svshost.exe 33 PID 2316 wrote to memory of 2100 2316 svshost.exe 34 PID 2316 wrote to memory of 2100 2316 svshost.exe 34 PID 2316 wrote to memory of 2100 2316 svshost.exe 34 PID 2316 wrote to memory of 2100 2316 svshost.exe 34 PID 2100 wrote to memory of 2108 2100 svshost.exe 35 PID 2100 wrote to memory of 2108 2100 svshost.exe 35 PID 2100 wrote to memory of 2108 2100 svshost.exe 35 PID 2100 wrote to memory of 2108 2100 svshost.exe 35 PID 2108 wrote to memory of 2728 2108 svshost.exe 36 PID 2108 wrote to memory of 2728 2108 svshost.exe 36 PID 2108 wrote to memory of 2728 2108 svshost.exe 36 PID 2108 wrote to memory of 2728 2108 svshost.exe 36 PID 2728 wrote to memory of 2848 2728 svshost.exe 37 PID 2728 wrote to memory of 2848 2728 svshost.exe 37 PID 2728 wrote to memory of 2848 2728 svshost.exe 37 PID 2728 wrote to memory of 2848 2728 svshost.exe 37 PID 2848 wrote to memory of 2580 2848 svshost.exe 38 PID 2848 wrote to memory of 2580 2848 svshost.exe 38 PID 2848 wrote to memory of 2580 2848 svshost.exe 38 PID 2848 wrote to memory of 2580 2848 svshost.exe 38 PID 2580 wrote to memory of 2680 2580 svshost.exe 39 PID 2580 wrote to memory of 2680 2580 svshost.exe 39 PID 2580 wrote to memory of 2680 2580 svshost.exe 39 PID 2580 wrote to memory of 2680 2580 svshost.exe 39 PID 2680 wrote to memory of 2112 2680 svshost.exe 40 PID 2680 wrote to memory of 2112 2680 svshost.exe 40 PID 2680 wrote to memory of 2112 2680 svshost.exe 40 PID 2680 wrote to memory of 2112 2680 svshost.exe 40 PID 2112 wrote to memory of 1740 2112 svshost.exe 41 PID 2112 wrote to memory of 1740 2112 svshost.exe 41 PID 2112 wrote to memory of 1740 2112 svshost.exe 41 PID 2112 wrote to memory of 1740 2112 svshost.exe 41 PID 1740 wrote to memory of 1300 1740 svshost.exe 42 PID 1740 wrote to memory of 1300 1740 svshost.exe 42 PID 1740 wrote to memory of 1300 1740 svshost.exe 42 PID 1740 wrote to memory of 1300 1740 svshost.exe 42 PID 1300 wrote to memory of 2920 1300 svshost.exe 43 PID 1300 wrote to memory of 2920 1300 svshost.exe 43 PID 1300 wrote to memory of 2920 1300 svshost.exe 43 PID 1300 wrote to memory of 2920 1300 svshost.exe 43 PID 2920 wrote to memory of 2964 2920 svshost.exe 44 PID 2920 wrote to memory of 2964 2920 svshost.exe 44 PID 2920 wrote to memory of 2964 2920 svshost.exe 44 PID 2920 wrote to memory of 2964 2920 svshost.exe 44 PID 2964 wrote to memory of 2960 2964 svshost.exe 45 PID 2964 wrote to memory of 2960 2964 svshost.exe 45 PID 2964 wrote to memory of 2960 2964 svshost.exe 45 PID 2964 wrote to memory of 2960 2964 svshost.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e126fe12f819972684ab3486bcd1018.exe"C:\Users\Admin\AppData\Local\Temp\0e126fe12f819972684ab3486bcd1018.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:2960 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:2968 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2984 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2816 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1144 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:740 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1908 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:328 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1972 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2456 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:900 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1868 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2780 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1048 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:968 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:572 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe33⤵
- Executes dropped EXE
PID:560 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe34⤵
- Executes dropped EXE
PID:1644 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe35⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe36⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2888 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe38⤵
- Executes dropped EXE
PID:556 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe39⤵
- Executes dropped EXE
PID:320 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe40⤵
- Executes dropped EXE
- Adds Run key to start application
PID:736 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe41⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1688 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe42⤵
- Executes dropped EXE
PID:1008 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1636 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe44⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1652 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe45⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe46⤵
- Executes dropped EXE
PID:2532 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe47⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2092 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe48⤵
- Executes dropped EXE
PID:2364 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1248 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe50⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3036 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe51⤵
- Executes dropped EXE
PID:2748 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe52⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2500 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe53⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2656 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe54⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2272 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1616 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1364 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe57⤵
- Executes dropped EXE
PID:2080 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe58⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:828 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe59⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3016 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe60⤵
- Executes dropped EXE
PID:2352 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe61⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2436 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe62⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1776 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe63⤵
- Executes dropped EXE
PID:1100 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2264 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe65⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1220 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe66⤵
- Adds Run key to start application
PID:1092 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe67⤵PID:384
-
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe68⤵
- Adds Run key to start application
PID:1916 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe69⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2976 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe70⤵
- Drops file in System32 directory
PID:1672 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe71⤵PID:1544
-
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe72⤵PID:1040
-
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe73⤵
- Adds Run key to start application
PID:1336 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe74⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1864 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe75⤵
- Drops file in System32 directory
PID:1952 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe76⤵
- Drops file in System32 directory
PID:2220 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe77⤵
- Adds Run key to start application
PID:1796 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe78⤵PID:1912
-
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe79⤵
- Adds Run key to start application
PID:888 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe80⤵PID:2356
-
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe81⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:688 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe82⤵
- Drops file in System32 directory
PID:884 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe83⤵
- Adds Run key to start application
PID:1524 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe84⤵
- Adds Run key to start application
PID:2464 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe85⤵
- Adds Run key to start application
PID:1372 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe86⤵PID:1488
-
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe87⤵PID:2640
-
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe88⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2276 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe89⤵
- Drops file in System32 directory
PID:3052 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe90⤵PID:1708
-
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe91⤵
- Adds Run key to start application
PID:1512 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe92⤵PID:2004
-
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe93⤵PID:2304
-
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe94⤵
- Drops file in System32 directory
PID:276 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe95⤵
- Adds Run key to start application
PID:872 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe96⤵
- Drops file in System32 directory
PID:3000 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe97⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2016 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe98⤵
- Adds Run key to start application
PID:2344 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe99⤵
- Drops file in System32 directory
PID:2104 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe100⤵PID:1600
-
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe101⤵
- Drops file in System32 directory
PID:1612 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe102⤵
- Drops file in System32 directory
PID:1712 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe103⤵PID:2184
-
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe104⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2212 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe105⤵PID:1632
-
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe106⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2752 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe107⤵PID:2688
-
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe108⤵
- Drops file in System32 directory
PID:836 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe109⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2684 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe110⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2712 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe111⤵
- Drops file in System32 directory
PID:2744 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe112⤵
- Drops file in System32 directory
PID:2496 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe113⤵
- Adds Run key to start application
PID:2484 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe114⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2244 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe115⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1948 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe116⤵PID:2676
-
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe117⤵
- Drops file in System32 directory
PID:2568 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe118⤵
- Adds Run key to start application
PID:2932 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe119⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2596 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe120⤵
- Drops file in System32 directory
PID:2756 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe121⤵
- Drops file in System32 directory
PID:2724 -
C:\Windows\SysWOW64\svshost.exeC:\Windows\system32\svshost.exe122⤵PID:2108
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-