Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-12-2023 04:26
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2819cbbf67c90445b1ac8555406c329e.exe
Resource
win7-20231215-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
2819cbbf67c90445b1ac8555406c329e.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
2819cbbf67c90445b1ac8555406c329e.exe
-
Size
679KB
-
MD5
2819cbbf67c90445b1ac8555406c329e
-
SHA1
d41913fd6946b8d9c3320c361b19f232fc6fa6a0
-
SHA256
e63158231bd8190746255e9d42b3c9d0c9be52373ce4705cadc97f35aec6448c
-
SHA512
3a5e7cbf1e329f9353be164f5ca530c169b76309041944a4ec2a8d1bd18d113e0bc0f1ca00212e270f1ab0664ecd1fca196d65d547ae6242a7ec082ee510eafb
-
SSDEEP
12288:ShSi53nC4lLMrL0Nh4eoj1mliehPWWkHvGdmpnOCRZDA95lv7Oc1AifYJF:ShSi5FBojshxe0Gtgag+F
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2652 svchost.exe 2332 svchost.exe 2740 svchost.exe 2228 svchost.exe 2576 svchost.exe 1996 svchost.exe 548 svchost.exe 2724 svchost.exe 1428 svchost.exe 1888 svchost.exe 1120 svchost.exe 1524 svchost.exe 1616 svchost.exe 1668 svchost.exe 1484 svchost.exe 2144 svchost.exe 2280 svchost.exe 2480 svchost.exe 2008 svchost.exe 1076 svchost.exe 2148 svchost.exe 1812 svchost.exe 1576 svchost.exe 2372 svchost.exe 988 svchost.exe 1660 svchost.exe 904 svchost.exe 1740 svchost.exe 1040 svchost.exe 1252 svchost.exe 2056 svchost.exe 876 svchost.exe 2616 svchost.exe 2664 svchost.exe 2704 svchost.exe 1204 svchost.exe 2680 svchost.exe 2556 svchost.exe 268 svchost.exe 3008 svchost.exe 2552 svchost.exe 1768 svchost.exe 2000 svchost.exe 1096 svchost.exe 1712 svchost.exe 1416 svchost.exe 1604 svchost.exe 1364 svchost.exe 2472 svchost.exe 2856 svchost.exe 296 svchost.exe 2052 svchost.exe 1148 svchost.exe 2804 svchost.exe 2776 svchost.exe 2792 svchost.exe 3028 svchost.exe 2600 svchost.exe 1392 svchost.exe 2860 svchost.exe 1164 svchost.exe 2872 svchost.exe 2244 svchost.exe 1188 svchost.exe -
Loads dropped DLL 64 IoCs
pid Process 2720 2819cbbf67c90445b1ac8555406c329e.exe 2720 2819cbbf67c90445b1ac8555406c329e.exe 2720 2819cbbf67c90445b1ac8555406c329e.exe 2652 svchost.exe 2652 svchost.exe 2652 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2740 svchost.exe 2740 svchost.exe 2740 svchost.exe 2228 svchost.exe 2228 svchost.exe 2228 svchost.exe 2576 svchost.exe 2576 svchost.exe 2576 svchost.exe 1996 svchost.exe 1996 svchost.exe 1996 svchost.exe 548 svchost.exe 548 svchost.exe 548 svchost.exe 2724 svchost.exe 2724 svchost.exe 2724 svchost.exe 1428 svchost.exe 1428 svchost.exe 1428 svchost.exe 1888 svchost.exe 1888 svchost.exe 1888 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1524 svchost.exe 1524 svchost.exe 1524 svchost.exe 1616 svchost.exe 1616 svchost.exe 1616 svchost.exe 1668 svchost.exe 1668 svchost.exe 1668 svchost.exe 1484 svchost.exe 1484 svchost.exe 1484 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2280 svchost.exe 2280 svchost.exe 2280 svchost.exe 2480 svchost.exe 2480 svchost.exe 2480 svchost.exe 2008 svchost.exe 2008 svchost.exe 2008 svchost.exe 1076 svchost.exe 1076 svchost.exe 1076 svchost.exe 2148 svchost.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321 2819cbbf67c90445b1ac8555406c329e.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File created C:\Windows\SysWOW64\25321\svchost.exe svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe File opened for modification C:\Windows\SysWOW64\25321\svchost.exe 2819cbbf67c90445b1ac8555406c329e.exe File opened for modification C:\Windows\SysWOW64\25321\tem.vbs svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321 svchost.exe File opened for modification C:\Windows\SysWOW64\25321\AntiOpenProcess.dll svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2720 2819cbbf67c90445b1ac8555406c329e.exe 2720 2819cbbf67c90445b1ac8555406c329e.exe 2720 2819cbbf67c90445b1ac8555406c329e.exe 2720 2819cbbf67c90445b1ac8555406c329e.exe 2720 2819cbbf67c90445b1ac8555406c329e.exe 2720 2819cbbf67c90445b1ac8555406c329e.exe 2720 2819cbbf67c90445b1ac8555406c329e.exe 2652 svchost.exe 2652 svchost.exe 2652 svchost.exe 2652 svchost.exe 2652 svchost.exe 2652 svchost.exe 2652 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2332 svchost.exe 2740 svchost.exe 2740 svchost.exe 2740 svchost.exe 2740 svchost.exe 2740 svchost.exe 2740 svchost.exe 2740 svchost.exe 2228 svchost.exe 2228 svchost.exe 2228 svchost.exe 2228 svchost.exe 2228 svchost.exe 2228 svchost.exe 2228 svchost.exe 2576 svchost.exe 2576 svchost.exe 2576 svchost.exe 2576 svchost.exe 2576 svchost.exe 2576 svchost.exe 2576 svchost.exe 1996 svchost.exe 1996 svchost.exe 1996 svchost.exe 1996 svchost.exe 1996 svchost.exe 1996 svchost.exe 1996 svchost.exe 548 svchost.exe 548 svchost.exe 548 svchost.exe 548 svchost.exe 548 svchost.exe 548 svchost.exe 548 svchost.exe 2724 svchost.exe 2724 svchost.exe 2724 svchost.exe 2724 svchost.exe 2724 svchost.exe 2724 svchost.exe 2724 svchost.exe 1428 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2652 2720 2819cbbf67c90445b1ac8555406c329e.exe 28 PID 2720 wrote to memory of 2652 2720 2819cbbf67c90445b1ac8555406c329e.exe 28 PID 2720 wrote to memory of 2652 2720 2819cbbf67c90445b1ac8555406c329e.exe 28 PID 2720 wrote to memory of 2652 2720 2819cbbf67c90445b1ac8555406c329e.exe 28 PID 2652 wrote to memory of 2332 2652 svchost.exe 29 PID 2652 wrote to memory of 2332 2652 svchost.exe 29 PID 2652 wrote to memory of 2332 2652 svchost.exe 29 PID 2652 wrote to memory of 2332 2652 svchost.exe 29 PID 2332 wrote to memory of 2740 2332 svchost.exe 30 PID 2332 wrote to memory of 2740 2332 svchost.exe 30 PID 2332 wrote to memory of 2740 2332 svchost.exe 30 PID 2332 wrote to memory of 2740 2332 svchost.exe 30 PID 2740 wrote to memory of 2228 2740 svchost.exe 31 PID 2740 wrote to memory of 2228 2740 svchost.exe 31 PID 2740 wrote to memory of 2228 2740 svchost.exe 31 PID 2740 wrote to memory of 2228 2740 svchost.exe 31 PID 2228 wrote to memory of 2576 2228 svchost.exe 32 PID 2228 wrote to memory of 2576 2228 svchost.exe 32 PID 2228 wrote to memory of 2576 2228 svchost.exe 32 PID 2228 wrote to memory of 2576 2228 svchost.exe 32 PID 2576 wrote to memory of 1996 2576 svchost.exe 34 PID 2576 wrote to memory of 1996 2576 svchost.exe 34 PID 2576 wrote to memory of 1996 2576 svchost.exe 34 PID 2576 wrote to memory of 1996 2576 svchost.exe 34 PID 2332 wrote to memory of 1016 2332 svchost.exe 35 PID 2332 wrote to memory of 1016 2332 svchost.exe 35 PID 2332 wrote to memory of 1016 2332 svchost.exe 35 PID 2332 wrote to memory of 1016 2332 svchost.exe 35 PID 2652 wrote to memory of 3020 2652 svchost.exe 33 PID 2652 wrote to memory of 3020 2652 svchost.exe 33 PID 2652 wrote to memory of 3020 2652 svchost.exe 33 PID 2652 wrote to memory of 3020 2652 svchost.exe 33 PID 1996 wrote to memory of 548 1996 svchost.exe 36 PID 1996 wrote to memory of 548 1996 svchost.exe 36 PID 1996 wrote to memory of 548 1996 svchost.exe 36 PID 1996 wrote to memory of 548 1996 svchost.exe 36 PID 548 wrote to memory of 2724 548 svchost.exe 41 PID 548 wrote to memory of 2724 548 svchost.exe 41 PID 548 wrote to memory of 2724 548 svchost.exe 41 PID 548 wrote to memory of 2724 548 svchost.exe 41 PID 2724 wrote to memory of 1428 2724 svchost.exe 40 PID 2724 wrote to memory of 1428 2724 svchost.exe 40 PID 2724 wrote to memory of 1428 2724 svchost.exe 40 PID 2724 wrote to memory of 1428 2724 svchost.exe 40 PID 1428 wrote to memory of 1888 1428 svchost.exe 39 PID 1428 wrote to memory of 1888 1428 svchost.exe 39 PID 1428 wrote to memory of 1888 1428 svchost.exe 39 PID 1428 wrote to memory of 1888 1428 svchost.exe 39 PID 1888 wrote to memory of 1120 1888 svchost.exe 38 PID 1888 wrote to memory of 1120 1888 svchost.exe 38 PID 1888 wrote to memory of 1120 1888 svchost.exe 38 PID 1888 wrote to memory of 1120 1888 svchost.exe 38 PID 1120 wrote to memory of 1524 1120 svchost.exe 37 PID 1120 wrote to memory of 1524 1120 svchost.exe 37 PID 1120 wrote to memory of 1524 1120 svchost.exe 37 PID 1120 wrote to memory of 1524 1120 svchost.exe 37 PID 1524 wrote to memory of 1616 1524 svchost.exe 42 PID 1524 wrote to memory of 1616 1524 svchost.exe 42 PID 1524 wrote to memory of 1616 1524 svchost.exe 42 PID 1524 wrote to memory of 1616 1524 svchost.exe 42 PID 1616 wrote to memory of 1668 1616 svchost.exe 43 PID 1616 wrote to memory of 1668 1616 svchost.exe 43 PID 1616 wrote to memory of 1668 1616 svchost.exe 43 PID 1616 wrote to memory of 1668 1616 svchost.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\2819cbbf67c90445b1ac8555406c329e.exe"C:\Users\Admin\AppData\Local\Temp\2819cbbf67c90445b1ac8555406c329e.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\25321\tem.vbs"10⤵PID:4908
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\25321\tem.vbs"9⤵PID:5752
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\25321\tem.vbs"8⤵PID:5564
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\25321\tem.vbs"7⤵PID:5516
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\25321\tem.vbs"6⤵PID:4636
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\25321\tem.vbs"5⤵PID:4076
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\25321\tem.vbs"4⤵PID:1016
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\SysWOW64\25321\tem.vbs"3⤵PID:3020
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\tem.vbs"2⤵PID:5180
-
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1668 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1484 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2144 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2280 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2480 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2008 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1076 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2148 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe11⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1576 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2372 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:988 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1660 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:904 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1740 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe18⤵
- Executes dropped EXE
PID:1040 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1252 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2056 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:876 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe22⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2664 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe24⤵
- Executes dropped EXE
PID:2704 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1204 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe26⤵
- Executes dropped EXE
PID:2680 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2556 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe28⤵
- Executes dropped EXE
PID:268 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3008 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe30⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe31⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe32⤵
- Executes dropped EXE
PID:2000 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe33⤵
- Executes dropped EXE
PID:1096 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe34⤵
- Executes dropped EXE
PID:1712 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe35⤵
- Executes dropped EXE
PID:1416 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1604 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1364 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe38⤵
- Executes dropped EXE
PID:2472 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe39⤵
- Executes dropped EXE
PID:2856 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe40⤵
- Executes dropped EXE
PID:296 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2052 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe42⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2804 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2776 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe45⤵
- Executes dropped EXE
PID:2792 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3028 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe47⤵
- Executes dropped EXE
PID:2600 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1392 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe49⤵
- Executes dropped EXE
PID:2860 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe50⤵
- Executes dropped EXE
PID:1164 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe51⤵
- Executes dropped EXE
PID:2872 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe52⤵
- Executes dropped EXE
PID:2244 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe53⤵
- Executes dropped EXE
PID:1188 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe54⤵
- Drops file in System32 directory
PID:2852 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe55⤵
- Drops file in System32 directory
PID:2684 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe56⤵
- Drops file in System32 directory
PID:3000 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe57⤵
- Drops file in System32 directory
PID:2824 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe58⤵
- Drops file in System32 directory
PID:1904 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe59⤵
- Drops file in System32 directory
PID:1832 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe60⤵PID:2428
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe61⤵
- Drops file in System32 directory
PID:1548 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe62⤵
- Drops file in System32 directory
PID:1964 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe63⤵PID:3120
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe64⤵
- Drops file in System32 directory
PID:3156 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe65⤵
- Drops file in System32 directory
PID:3200 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe66⤵PID:3248
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe67⤵
- Drops file in System32 directory
PID:3284 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe68⤵
- Drops file in System32 directory
PID:3328 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe69⤵PID:3372
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe70⤵
- Drops file in System32 directory
PID:3408 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe71⤵PID:3496
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe72⤵
- Drops file in System32 directory
PID:3540 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe73⤵PID:3584
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe74⤵
- Drops file in System32 directory
PID:3628 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe75⤵
- Drops file in System32 directory
PID:3688 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe76⤵
- Drops file in System32 directory
PID:3716 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe77⤵
- Drops file in System32 directory
PID:3764 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe78⤵PID:3792
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe79⤵PID:3820
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe80⤵
- Drops file in System32 directory
PID:3880 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe81⤵
- Drops file in System32 directory
PID:3912 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe82⤵
- Drops file in System32 directory
PID:3972 -
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe83⤵PID:4016
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe84⤵PID:4040
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe85⤵PID:4092
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe86⤵PID:3196
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe87⤵PID:3280
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe88⤵PID:3348
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe89⤵PID:3440
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe90⤵PID:3520
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe91⤵PID:3592
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe92⤵PID:3740
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe93⤵PID:3908
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe94⤵PID:3852
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe95⤵PID:4056
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe96⤵PID:3228
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe97⤵PID:3732
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe98⤵PID:3980
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe99⤵PID:3132
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe100⤵PID:3696
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe101⤵PID:3668
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe102⤵PID:4112
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe103⤵PID:4152
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe104⤵PID:4188
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe105⤵PID:4244
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe106⤵PID:4268
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe107⤵PID:4316
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe108⤵PID:4340
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe109⤵PID:4368
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe110⤵PID:4408
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe111⤵PID:4456
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe112⤵PID:4484
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe113⤵PID:4508
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe114⤵PID:4528
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe115⤵PID:4588
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe116⤵PID:4612
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe117⤵PID:4656
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe118⤵PID:4680
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe119⤵PID:4712
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe120⤵PID:4748
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe121⤵PID:4796
-
C:\Windows\SysWOW64\25321\svchost.exeC:\Windows\System32\25321\svchost.exe122⤵PID:4832
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-