Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/05/2024, 11:57
Behavioral task
behavioral1
Sample
687b016dfc310bd16a904c80ceeeae50_NEAS.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
687b016dfc310bd16a904c80ceeeae50_NEAS.exe
Resource
win10v2004-20240419-en
General
-
Target
687b016dfc310bd16a904c80ceeeae50_NEAS.exe
-
Size
1.5MB
-
MD5
687b016dfc310bd16a904c80ceeeae50
-
SHA1
34ae9d20ef3b530e84b974c07d32b8da80c6c8b0
-
SHA256
eee3f871fddd2258ff1d10853ef4f0e1be8f253e53448415edea1b48ca7086f2
-
SHA512
dc3f445ec8397888094ef7c2cc68031f6a93291e2bcb50114d9aed9d9e9f3dfc8d01f3772b48d425353e0f1cc8fd67848d38e9aa0f604a918e286d04e444e595
-
SSDEEP
49152:t6ZlrP337uzHnA6cXnHvRjk9HWq0f+444444n:ylrP337uzHnA6cHI2/+444444n
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral1/files/0x000100000001030f-22.dat family_neshta behavioral1/files/0x0036000000015653-25.dat family_neshta behavioral1/files/0x000800000001567f-39.dat family_neshta behavioral1/files/0x000100000001030d-37.dat family_neshta behavioral1/files/0x00010000000106a5-36.dat family_neshta behavioral1/files/0x0037000000010323-35.dat family_neshta behavioral1/memory/2836-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2468-51-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2492-67-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2308-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1696-82-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2704-81-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2816-97-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1032-96-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1676-110-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1296-111-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x000100000000f7ce-121.dat family_neshta behavioral1/files/0x000100000000f7d3-124.dat family_neshta behavioral1/files/0x000100000000f771-127.dat family_neshta behavioral1/memory/640-132-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/448-131-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x000100000000f7c5-142.dat family_neshta behavioral1/files/0x000100000000f7e1-145.dat family_neshta behavioral1/files/0x000100000000f6fe-152.dat family_neshta behavioral1/memory/860-163-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1036-162-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2056-171-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2640-172-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2068-192-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1868-191-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1724-213-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/420-212-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1396-228-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1248-225-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1796-244-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/568-243-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2296-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1612-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1700-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2588-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2568-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2852-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2804-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2740-312-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2932-320-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2468-321-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2508-328-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2492-329-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2712-336-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2788-337-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1432-345-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1652-344-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2236-353-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1856-352-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2356-361-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2668-360-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1200-368-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/988-369-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2964-377-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/896-376-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1640-385-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/604-384-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2480-393-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/288-392-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
pid Process 2380 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 2052 svchost.exe 2700 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 2572 svchost.exe 2836 svchost.com 2468 687B01~1.EXE 2492 svchost.com 2308 687B01~1.EXE 1696 svchost.com 2704 687B01~1.EXE 2816 svchost.com 1032 687B01~1.EXE 1296 svchost.com 1676 687B01~1.EXE 640 svchost.com 448 687B01~1.EXE 1036 svchost.com 860 687B01~1.EXE 2640 svchost.com 2056 687B01~1.EXE 2068 svchost.com 1868 687B01~1.EXE 420 svchost.com 1724 687B01~1.EXE 1396 svchost.com 1248 687B01~1.EXE 568 svchost.com 1796 687B01~1.EXE 1612 svchost.com 2296 687B01~1.EXE 1700 svchost.com 2588 687B01~1.EXE 2852 svchost.com 2568 687B01~1.EXE 2804 svchost.com 2740 687B01~1.EXE 2468 svchost.com 2932 687B01~1.EXE 2492 svchost.com 2508 687B01~1.EXE 2788 svchost.com 2712 687B01~1.EXE 1432 svchost.com 1652 687B01~1.EXE 1856 svchost.com 2236 687B01~1.EXE 2356 svchost.com 2668 687B01~1.EXE 1200 svchost.com 988 687B01~1.EXE 896 svchost.com 2964 687B01~1.EXE 1640 svchost.com 604 687B01~1.EXE 2480 svchost.com 288 687B01~1.EXE 3056 svchost.com 2024 687B01~1.EXE 1812 svchost.com 2924 687B01~1.EXE 1492 svchost.com 1868 687B01~1.EXE 3044 svchost.com 2864 687B01~1.EXE -
Loads dropped DLL 64 IoCs
pid Process 1948 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 1948 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 2052 svchost.exe 2052 svchost.exe 2836 svchost.com 2836 svchost.com 2492 svchost.com 2492 svchost.com 1696 svchost.com 1696 svchost.com 2816 svchost.com 2816 svchost.com 1296 svchost.com 1296 svchost.com 640 svchost.com 640 svchost.com 1036 svchost.com 2700 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 1948 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 1036 svchost.com 2640 svchost.com 2640 svchost.com 2068 svchost.com 2068 svchost.com 2700 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 1948 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 420 svchost.com 420 svchost.com 1948 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 1396 svchost.com 1396 svchost.com 568 svchost.com 568 svchost.com 1612 svchost.com 1612 svchost.com 1700 svchost.com 1700 svchost.com 2852 svchost.com 2852 svchost.com 2804 svchost.com 2804 svchost.com 1948 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 2468 svchost.com 2468 svchost.com 2492 svchost.com 2492 svchost.com 2788 svchost.com 2788 svchost.com 1432 svchost.com 1432 svchost.com 1856 svchost.com 1856 svchost.com 2356 svchost.com 2356 svchost.com 1200 svchost.com 1200 svchost.com 896 svchost.com 896 svchost.com 1640 svchost.com 1640 svchost.com 2480 svchost.com 2480 svchost.com 3056 svchost.com 3056 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 687b016dfc310bd16a904c80ceeeae50_NEAS.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE svchost.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 687b016dfc310bd16a904c80ceeeae50_NEAS.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 687B01~1.EXE File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 687B01~1.EXE File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 687B01~1.EXE File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 687B01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\directx.sys 687B01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 687B01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 687B01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 687B01~1.EXE File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\svchost.com 687B01~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 687B01~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 687b016dfc310bd16a904c80ceeeae50_NEAS.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2380 1948 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 28 PID 1948 wrote to memory of 2380 1948 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 28 PID 1948 wrote to memory of 2380 1948 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 28 PID 1948 wrote to memory of 2380 1948 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 28 PID 2380 wrote to memory of 2052 2380 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 29 PID 2380 wrote to memory of 2052 2380 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 29 PID 2380 wrote to memory of 2052 2380 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 29 PID 2380 wrote to memory of 2052 2380 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 29 PID 2052 wrote to memory of 2700 2052 svchost.exe 30 PID 2052 wrote to memory of 2700 2052 svchost.exe 30 PID 2052 wrote to memory of 2700 2052 svchost.exe 30 PID 2052 wrote to memory of 2700 2052 svchost.exe 30 PID 2700 wrote to memory of 2836 2700 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 32 PID 2700 wrote to memory of 2836 2700 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 32 PID 2700 wrote to memory of 2836 2700 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 32 PID 2700 wrote to memory of 2836 2700 687b016dfc310bd16a904c80ceeeae50_NEAS.exe 32 PID 2836 wrote to memory of 2468 2836 svchost.com 64 PID 2836 wrote to memory of 2468 2836 svchost.com 64 PID 2836 wrote to memory of 2468 2836 svchost.com 64 PID 2836 wrote to memory of 2468 2836 svchost.com 64 PID 2468 wrote to memory of 2492 2468 687B01~1.EXE 66 PID 2468 wrote to memory of 2492 2468 687B01~1.EXE 66 PID 2468 wrote to memory of 2492 2468 687B01~1.EXE 66 PID 2468 wrote to memory of 2492 2468 687B01~1.EXE 66 PID 2492 wrote to memory of 2308 2492 svchost.com 35 PID 2492 wrote to memory of 2308 2492 svchost.com 35 PID 2492 wrote to memory of 2308 2492 svchost.com 35 PID 2492 wrote to memory of 2308 2492 svchost.com 35 PID 2308 wrote to memory of 1696 2308 687B01~1.EXE 36 PID 2308 wrote to memory of 1696 2308 687B01~1.EXE 36 PID 2308 wrote to memory of 1696 2308 687B01~1.EXE 36 PID 2308 wrote to memory of 1696 2308 687B01~1.EXE 36 PID 1696 wrote to memory of 2704 1696 svchost.com 37 PID 1696 wrote to memory of 2704 1696 svchost.com 37 PID 1696 wrote to memory of 2704 1696 svchost.com 37 PID 1696 wrote to memory of 2704 1696 svchost.com 37 PID 2704 wrote to memory of 2816 2704 687B01~1.EXE 38 PID 2704 wrote to memory of 2816 2704 687B01~1.EXE 38 PID 2704 wrote to memory of 2816 2704 687B01~1.EXE 38 PID 2704 wrote to memory of 2816 2704 687B01~1.EXE 38 PID 2816 wrote to memory of 1032 2816 svchost.com 39 PID 2816 wrote to memory of 1032 2816 svchost.com 39 PID 2816 wrote to memory of 1032 2816 svchost.com 39 PID 2816 wrote to memory of 1032 2816 svchost.com 39 PID 1032 wrote to memory of 1296 1032 687B01~1.EXE 40 PID 1032 wrote to memory of 1296 1032 687B01~1.EXE 40 PID 1032 wrote to memory of 1296 1032 687B01~1.EXE 40 PID 1032 wrote to memory of 1296 1032 687B01~1.EXE 40 PID 1296 wrote to memory of 1676 1296 svchost.com 41 PID 1296 wrote to memory of 1676 1296 svchost.com 41 PID 1296 wrote to memory of 1676 1296 svchost.com 41 PID 1296 wrote to memory of 1676 1296 svchost.com 41 PID 1676 wrote to memory of 640 1676 687B01~1.EXE 42 PID 1676 wrote to memory of 640 1676 687B01~1.EXE 42 PID 1676 wrote to memory of 640 1676 687B01~1.EXE 42 PID 1676 wrote to memory of 640 1676 687B01~1.EXE 42 PID 640 wrote to memory of 448 640 svchost.com 43 PID 640 wrote to memory of 448 640 svchost.com 43 PID 640 wrote to memory of 448 640 svchost.com 43 PID 640 wrote to memory of 448 640 svchost.com 43 PID 448 wrote to memory of 1036 448 687B01~1.EXE 44 PID 448 wrote to memory of 1036 448 687B01~1.EXE 44 PID 448 wrote to memory of 1036 448 687B01~1.EXE 44 PID 448 wrote to memory of 1036 448 687B01~1.EXE 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\687b016dfc310bd16a904c80ceeeae50_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\687b016dfc310bd16a904c80ceeeae50_NEAS.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687b016dfc310bd16a904c80ceeeae50_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\687b016dfc310bd16a904c80ceeeae50_NEAS.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\687b016dfc310bd16a904c80ceeeae50_NEAS.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687b016dfc310bd16a904c80ceeeae50_NEAS.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\687b016dfc310bd16a904c80ceeeae50_NEAS.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE18⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE20⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE22⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE24⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE26⤵
- Executes dropped EXE
PID:1248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:568 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE28⤵
- Executes dropped EXE
PID:1796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE30⤵
- Executes dropped EXE
PID:2296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE32⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE34⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE36⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE38⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE40⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE42⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE44⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE48⤵
- Executes dropped EXE
PID:2668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:896 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE52⤵
- Executes dropped EXE
PID:2964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE54⤵
- Executes dropped EXE
PID:604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE58⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"59⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE60⤵
- Executes dropped EXE
PID:2924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"61⤵
- Executes dropped EXE
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE62⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE64⤵
- Executes dropped EXE
PID:2864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"65⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE66⤵PID:1724
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"67⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE68⤵PID:772
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"69⤵
- Drops file in Windows directory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE70⤵PID:916
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"71⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE72⤵PID:1608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"73⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE74⤵PID:2368
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"75⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE76⤵PID:1840
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"77⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE78⤵PID:2544
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"79⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE80⤵PID:2588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"81⤵
- Drops file in Windows directory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE82⤵PID:2568
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"83⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE84⤵PID:2564
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"85⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE86⤵
- Drops file in Windows directory
PID:2516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"87⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE88⤵PID:2692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"89⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE90⤵PID:2712
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"91⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE92⤵PID:1568
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"93⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE94⤵PID:2332
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"95⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE96⤵PID:2416
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"97⤵PID:712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE98⤵PID:872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"99⤵
- Drops file in Windows directory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE100⤵PID:1620
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"101⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE102⤵
- Drops file in Windows directory
PID:936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"103⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE104⤵PID:2120
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"105⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE106⤵PID:2036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"107⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE108⤵PID:2420
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"109⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE110⤵PID:1540
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"111⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE112⤵PID:2148
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"113⤵PID:420
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE114⤵PID:456
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"115⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE116⤵PID:3016
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"117⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE118⤵PID:304
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"119⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE120⤵PID:2016
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE"121⤵
- Drops file in Windows directory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\687B01~1.EXE122⤵PID:1704
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-