Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
19-06-2024 20:27
Behavioral task
behavioral1
Sample
34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe
Resource
win7-20240508-en
General
-
Target
34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe
-
Size
206KB
-
MD5
aa08eb4c01a8f694395ad2a5281b0235
-
SHA1
ef8e99ed36a864a9b1d3e91705506a076e7d6274
-
SHA256
34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211
-
SHA512
d8fc08ff2a9924b72d24d6d515d9797326a84a14adbd6509354659f6c5504a515cd9ee95475d797ed01b28243dd31e4bfd954040932458b78b37ab0ed0ec7579
-
SSDEEP
1536:JxqjQ+P04wsmJCjZdX7Xl0CFChLCZdBFmav82unyYNrbmpcKJOxqjQ+P04wsmJCH:sr85CfXl0CFUeZUOuPHK9r85Cxr85C
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe family_neshta C:\Windows\svchost.com family_neshta behavioral2/memory/4576-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2900-20-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1220-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1600-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/828-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/212-50-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3792-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2520-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5092-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4652-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1524-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3132-80-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4100-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/628-99-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe family_neshta behavioral2/memory/3472-119-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4580-123-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4492-131-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4604-143-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE family_neshta C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe family_neshta C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe family_neshta C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaw.exe family_neshta C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe family_neshta behavioral2/memory/404-158-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE family_neshta C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE family_neshta C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\elevation_service.exe family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\identity_helper.exe family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\msedge.exe family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\INSTAL~1\setup.exe family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\cookie_exporter.exe family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\BHO\ie_to_edge_stub.exe family_neshta C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE family_neshta C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE family_neshta behavioral2/memory/4092-224-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1224-237-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3564-245-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4900-251-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2752-258-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2012-259-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3016-266-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2964-267-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2096-269-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2272-275-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2344-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5056-283-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4412-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4376-291-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4216-293-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1608-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3880-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1932-307-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1284-309-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1964-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1764-317-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Modifies security service 2 TTPs 2 IoCs
Processes:
winblrsnrcs.exesysmablsvr.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" sysmablsvr.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Phorphiex payload 3 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe family_phorphiex C:\Users\Admin\sysdinrdvs.exe family_phorphiex C:\Windows\sysmablsvr.exe family_phorphiex -
Suspicious use of NtCreateUserProcessOtherParentProcess 4 IoCs
Processes:
3068410584.exewupgrdsv.exedescription pid process target process PID 2848 created 3436 2848 3068410584.exe Explorer.EXE PID 2848 created 3436 2848 3068410584.exe Explorer.EXE PID 4032 created 3436 4032 wupgrdsv.exe Explorer.EXE PID 4032 created 3436 4032 wupgrdsv.exe Explorer.EXE -
Processes:
winblrsnrcs.exesysmablsvr.exe34628C~1.EXEdescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 34628C~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 34628C~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 34628C~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 34628C~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 34628C~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 34628C~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winblrsnrcs.exe -
Downloads MZ/PE file
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXEdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation 34628C~1.EXE -
Executes dropped EXE 64 IoCs
Processes:
34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exesvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.compid process 2916 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe 4576 svchost.com 2900 34628C~1.EXE 1220 svchost.com 1600 34628C~1.EXE 828 svchost.com 212 34628C~1.EXE 3792 svchost.com 2520 34628C~1.EXE 5092 svchost.com 4652 34628C~1.EXE 1524 svchost.com 3132 34628C~1.EXE 4100 svchost.com 628 34628C~1.EXE 3472 svchost.com 4580 34628C~1.EXE 4492 svchost.com 4604 34628C~1.EXE 404 svchost.com 4092 34628C~1.EXE 1224 svchost.com 3564 34628C~1.EXE 4900 svchost.com 2752 34628C~1.EXE 2012 svchost.com 3016 34628C~1.EXE 2964 svchost.com 2096 34628C~1.EXE 2272 svchost.com 2344 34628C~1.EXE 5056 svchost.com 4412 34628C~1.EXE 4376 svchost.com 4216 34628C~1.EXE 1608 svchost.com 3880 34628C~1.EXE 1932 svchost.com 1284 34628C~1.EXE 1964 svchost.com 1764 34628C~1.EXE 2368 svchost.com 1836 34628C~1.EXE 1852 svchost.com 3464 34628C~1.EXE 672 svchost.com 4448 34628C~1.EXE 2732 svchost.com 4876 34628C~1.EXE 3156 svchost.com 5092 34628C~1.EXE 1580 svchost.com 4168 34628C~1.EXE 2524 svchost.com 3560 34628C~1.EXE 3092 svchost.com 2264 34628C~1.EXE 3924 svchost.com 3424 34628C~1.EXE 1724 svchost.com 1340 34628C~1.EXE 2788 svchost.com 2848 34628C~1.EXE 1072 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
sysmablsvr.exewinblrsnrcs.exe34628C~1.EXEdescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" 34628C~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 34628C~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 34628C~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 34628C~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" sysmablsvr.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" winblrsnrcs.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiSpywareOverride = "1" 34628C~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesOverride = "1" 34628C~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 34628C~1.EXE Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" sysmablsvr.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
3191529532.exe34628C~1.EXE1973215878.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Service = "C:\\Windows\\winblrsnrcs.exe" 3191529532.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysdinrdvs.exe" 34628C~1.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Users\\Admin\\sysdinrdvs.exe" 34628C~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Settings = "C:\\Windows\\sysmablsvr.exe" 1973215878.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
wupgrdsv.exedescription pid process target process PID 4032 set thread context of 4500 4032 wupgrdsv.exe notepad.exe -
Drops file in Program Files directory 64 IoCs
Processes:
34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MI9C33~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\msedge.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\msedge_proxy.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MI391D~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MIA062~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\identity_helper.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\msedgewebview2.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~2.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~3.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MICROS~3.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13187~1.37\MIA062~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\msedge_pwa_launcher.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\124024~1.80\INSTAL~1\setup.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe -
Drops file in Windows directory 64 IoCs
Processes:
34628C~1.EXEsvchost.comsvchost.com34628C~1.EXEsvchost.com34628C~1.EXE34628C~1.EXEsvchost.comsvchost.comsvchost.com34628C~1.EXE34628C~1.EXE34628C~1.EXEsvchost.com34628C~1.EXE34628C~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com34628C~1.EXE34628C~1.EXEsvchost.com34628C~1.EXE34628C~1.EXEsvchost.com34628C~1.EXE34628C~1.EXEsvchost.comsvchost.com34628C~1.EXEsvchost.comsvchost.com34628C~1.EXEsvchost.comsvchost.com34628C~1.EXEsvchost.comsvchost.com34628C~1.EXE34628C~1.EXEsvchost.com34628C~1.EXEsvchost.comsvchost.comsvchost.com34628C~1.EXE34628C~1.EXE34628C~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com34628C~1.EXEsvchost.comsvchost.com34628C~1.EXEdescription ioc process File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\directx.sys 34628C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 34628C~1.EXE File opened for modification C:\Windows\directx.sys 34628C~1.EXE File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 34628C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 34628C~1.EXE File opened for modification C:\Windows\directx.sys 34628C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 34628C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 34628C~1.EXE File opened for modification C:\Windows\directx.sys 34628C~1.EXE File opened for modification C:\Windows\directx.sys 34628C~1.EXE File opened for modification C:\Windows\directx.sys 34628C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 34628C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 34628C~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
Processes:
34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXE34628C~1.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE Key created \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000_Classes\Local Settings 34628C~1.EXE -
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
3068410584.exepowershell.exewupgrdsv.exepowershell.exepid process 2848 3068410584.exe 2848 3068410584.exe 696 powershell.exe 696 powershell.exe 696 powershell.exe 2848 3068410584.exe 2848 3068410584.exe 4032 wupgrdsv.exe 4032 wupgrdsv.exe 4544 powershell.exe 4544 powershell.exe 4544 powershell.exe 4032 wupgrdsv.exe 4032 wupgrdsv.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
sysmablsvr.exepid process 1836 sysmablsvr.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
powershell.exedescription pid process Token: SeDebugPrivilege 696 powershell.exe Token: SeIncreaseQuotaPrivilege 696 powershell.exe Token: SeSecurityPrivilege 696 powershell.exe Token: SeTakeOwnershipPrivilege 696 powershell.exe Token: SeLoadDriverPrivilege 696 powershell.exe Token: SeSystemProfilePrivilege 696 powershell.exe Token: SeSystemtimePrivilege 696 powershell.exe Token: SeProfSingleProcessPrivilege 696 powershell.exe Token: SeIncBasePriorityPrivilege 696 powershell.exe Token: SeCreatePagefilePrivilege 696 powershell.exe Token: SeBackupPrivilege 696 powershell.exe Token: SeRestorePrivilege 696 powershell.exe Token: SeShutdownPrivilege 696 powershell.exe Token: SeDebugPrivilege 696 powershell.exe Token: SeSystemEnvironmentPrivilege 696 powershell.exe Token: SeRemoteShutdownPrivilege 696 powershell.exe Token: SeUndockPrivilege 696 powershell.exe Token: SeManageVolumePrivilege 696 powershell.exe Token: 33 696 powershell.exe Token: 34 696 powershell.exe Token: 35 696 powershell.exe Token: 36 696 powershell.exe Token: SeIncreaseQuotaPrivilege 696 powershell.exe Token: SeSecurityPrivilege 696 powershell.exe Token: SeTakeOwnershipPrivilege 696 powershell.exe Token: SeLoadDriverPrivilege 696 powershell.exe Token: SeSystemProfilePrivilege 696 powershell.exe Token: SeSystemtimePrivilege 696 powershell.exe Token: SeProfSingleProcessPrivilege 696 powershell.exe Token: SeIncBasePriorityPrivilege 696 powershell.exe Token: SeCreatePagefilePrivilege 696 powershell.exe Token: SeBackupPrivilege 696 powershell.exe Token: SeRestorePrivilege 696 powershell.exe Token: SeShutdownPrivilege 696 powershell.exe Token: SeDebugPrivilege 696 powershell.exe Token: SeSystemEnvironmentPrivilege 696 powershell.exe Token: SeRemoteShutdownPrivilege 696 powershell.exe Token: SeUndockPrivilege 696 powershell.exe Token: SeManageVolumePrivilege 696 powershell.exe Token: 33 696 powershell.exe Token: 34 696 powershell.exe Token: 35 696 powershell.exe Token: 36 696 powershell.exe Token: SeIncreaseQuotaPrivilege 696 powershell.exe Token: SeSecurityPrivilege 696 powershell.exe Token: SeTakeOwnershipPrivilege 696 powershell.exe Token: SeLoadDriverPrivilege 696 powershell.exe Token: SeSystemProfilePrivilege 696 powershell.exe Token: SeSystemtimePrivilege 696 powershell.exe Token: SeProfSingleProcessPrivilege 696 powershell.exe Token: SeIncBasePriorityPrivilege 696 powershell.exe Token: SeCreatePagefilePrivilege 696 powershell.exe Token: SeBackupPrivilege 696 powershell.exe Token: SeRestorePrivilege 696 powershell.exe Token: SeShutdownPrivilege 696 powershell.exe Token: SeDebugPrivilege 696 powershell.exe Token: SeSystemEnvironmentPrivilege 696 powershell.exe Token: SeRemoteShutdownPrivilege 696 powershell.exe Token: SeUndockPrivilege 696 powershell.exe Token: SeManageVolumePrivilege 696 powershell.exe Token: 33 696 powershell.exe Token: 34 696 powershell.exe Token: 35 696 powershell.exe Token: 36 696 powershell.exe -
Suspicious use of FindShellTrayWindow 51 IoCs
Processes:
notepad.exepid process 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe -
Suspicious use of SendNotifyMessage 51 IoCs
Processes:
notepad.exepid process 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe 4500 notepad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exesvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEsvchost.com34628C~1.EXEdescription pid process target process PID 3684 wrote to memory of 2916 3684 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe PID 3684 wrote to memory of 2916 3684 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe PID 3684 wrote to memory of 2916 3684 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe PID 2916 wrote to memory of 4576 2916 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe svchost.com PID 2916 wrote to memory of 4576 2916 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe svchost.com PID 2916 wrote to memory of 4576 2916 34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe svchost.com PID 4576 wrote to memory of 2900 4576 svchost.com 34628C~1.EXE PID 4576 wrote to memory of 2900 4576 svchost.com 34628C~1.EXE PID 4576 wrote to memory of 2900 4576 svchost.com 34628C~1.EXE PID 2900 wrote to memory of 1220 2900 34628C~1.EXE svchost.com PID 2900 wrote to memory of 1220 2900 34628C~1.EXE svchost.com PID 2900 wrote to memory of 1220 2900 34628C~1.EXE svchost.com PID 1220 wrote to memory of 1600 1220 svchost.com 34628C~1.EXE PID 1220 wrote to memory of 1600 1220 svchost.com 34628C~1.EXE PID 1220 wrote to memory of 1600 1220 svchost.com 34628C~1.EXE PID 1600 wrote to memory of 828 1600 34628C~1.EXE svchost.com PID 1600 wrote to memory of 828 1600 34628C~1.EXE svchost.com PID 1600 wrote to memory of 828 1600 34628C~1.EXE svchost.com PID 828 wrote to memory of 212 828 svchost.com 34628C~1.EXE PID 828 wrote to memory of 212 828 svchost.com 34628C~1.EXE PID 828 wrote to memory of 212 828 svchost.com 34628C~1.EXE PID 212 wrote to memory of 3792 212 34628C~1.EXE svchost.com PID 212 wrote to memory of 3792 212 34628C~1.EXE svchost.com PID 212 wrote to memory of 3792 212 34628C~1.EXE svchost.com PID 3792 wrote to memory of 2520 3792 svchost.com 34628C~1.EXE PID 3792 wrote to memory of 2520 3792 svchost.com 34628C~1.EXE PID 3792 wrote to memory of 2520 3792 svchost.com 34628C~1.EXE PID 2520 wrote to memory of 5092 2520 34628C~1.EXE 34628C~1.EXE PID 2520 wrote to memory of 5092 2520 34628C~1.EXE 34628C~1.EXE PID 2520 wrote to memory of 5092 2520 34628C~1.EXE 34628C~1.EXE PID 5092 wrote to memory of 4652 5092 svchost.com 34628C~1.EXE PID 5092 wrote to memory of 4652 5092 svchost.com 34628C~1.EXE PID 5092 wrote to memory of 4652 5092 svchost.com 34628C~1.EXE PID 4652 wrote to memory of 1524 4652 34628C~1.EXE svchost.com PID 4652 wrote to memory of 1524 4652 34628C~1.EXE svchost.com PID 4652 wrote to memory of 1524 4652 34628C~1.EXE svchost.com PID 1524 wrote to memory of 3132 1524 svchost.com 34628C~1.EXE PID 1524 wrote to memory of 3132 1524 svchost.com 34628C~1.EXE PID 1524 wrote to memory of 3132 1524 svchost.com 34628C~1.EXE PID 3132 wrote to memory of 4100 3132 34628C~1.EXE svchost.com PID 3132 wrote to memory of 4100 3132 34628C~1.EXE svchost.com PID 3132 wrote to memory of 4100 3132 34628C~1.EXE svchost.com PID 4100 wrote to memory of 628 4100 svchost.com 34628C~1.EXE PID 4100 wrote to memory of 628 4100 svchost.com 34628C~1.EXE PID 4100 wrote to memory of 628 4100 svchost.com 34628C~1.EXE PID 628 wrote to memory of 3472 628 34628C~1.EXE svchost.com PID 628 wrote to memory of 3472 628 34628C~1.EXE svchost.com PID 628 wrote to memory of 3472 628 34628C~1.EXE svchost.com PID 3472 wrote to memory of 4580 3472 svchost.com 34628C~1.EXE PID 3472 wrote to memory of 4580 3472 svchost.com 34628C~1.EXE PID 3472 wrote to memory of 4580 3472 svchost.com 34628C~1.EXE PID 4580 wrote to memory of 4492 4580 34628C~1.EXE svchost.com PID 4580 wrote to memory of 4492 4580 34628C~1.EXE svchost.com PID 4580 wrote to memory of 4492 4580 34628C~1.EXE svchost.com PID 4492 wrote to memory of 4604 4492 svchost.com 34628C~1.EXE PID 4492 wrote to memory of 4604 4492 svchost.com 34628C~1.EXE PID 4492 wrote to memory of 4604 4492 svchost.com 34628C~1.EXE PID 4604 wrote to memory of 404 4604 34628C~1.EXE svchost.com PID 4604 wrote to memory of 404 4604 34628C~1.EXE svchost.com PID 4604 wrote to memory of 404 4604 34628C~1.EXE svchost.com PID 404 wrote to memory of 4092 404 svchost.com 34628C~1.EXE PID 404 wrote to memory of 4092 404 svchost.com 34628C~1.EXE PID 404 wrote to memory of 4092 404 svchost.com 34628C~1.EXE PID 4092 wrote to memory of 1224 4092 34628C~1.EXE svchost.com -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe"C:\Users\Admin\AppData\Local\Temp\34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe"2⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\34628ca1039a637936735225d91cf6ec1b3042a56fdee1de39ce17775963b211.exe"3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE7⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3792 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE17⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"18⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE19⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"22⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"24⤵
- Executes dropped EXE
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE25⤵
- Executes dropped EXE
PID:3564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"26⤵
- Executes dropped EXE
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE27⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"28⤵
- Executes dropped EXE
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE29⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"30⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE31⤵
- Executes dropped EXE
PID:2096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"32⤵
- Executes dropped EXE
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE33⤵
- Checks computer location settings
- Executes dropped EXE
PID:2344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"34⤵
- Executes dropped EXE
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE35⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"36⤵
- Executes dropped EXE
PID:4376 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE37⤵
- Checks computer location settings
- Executes dropped EXE
PID:4216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"38⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE39⤵
- Executes dropped EXE
PID:3880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"40⤵
- Executes dropped EXE
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE41⤵
- Checks computer location settings
- Executes dropped EXE
PID:1284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"42⤵
- Executes dropped EXE
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE43⤵
- Checks computer location settings
- Executes dropped EXE
PID:1764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"44⤵
- Executes dropped EXE
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE45⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1836 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"46⤵
- Executes dropped EXE
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE47⤵
- Checks computer location settings
- Executes dropped EXE
PID:3464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"48⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE49⤵
- Checks computer location settings
- Executes dropped EXE
PID:4448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"50⤵
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE51⤵
- Executes dropped EXE
- Modifies registry class
PID:4876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"52⤵
- Executes dropped EXE
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE53⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"54⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE55⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"56⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE57⤵
- Checks computer location settings
- Executes dropped EXE
PID:3560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"58⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE59⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"60⤵
- Executes dropped EXE
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE61⤵
- Executes dropped EXE
- Modifies registry class
PID:3424 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"62⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE63⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"64⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE65⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"66⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE67⤵
- Modifies registry class
PID:4316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"68⤵
- Drops file in Windows directory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE69⤵
- Modifies registry class
PID:1764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"70⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE71⤵
- Checks computer location settings
- Modifies registry class
PID:544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"72⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE73⤵
- Drops file in Windows directory
- Modifies registry class
PID:1592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"74⤵
- Drops file in Windows directory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE75⤵
- Drops file in Windows directory
PID:5036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"76⤵
- Drops file in Windows directory
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE77⤵PID:4372
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"78⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE79⤵
- Checks computer location settings
- Modifies registry class
PID:3120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"80⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE81⤵
- Checks computer location settings
- Modifies registry class
PID:4432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"82⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE83⤵
- Drops file in Windows directory
- Modifies registry class
PID:3108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"84⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE85⤵
- Modifies registry class
PID:4972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"86⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE87⤵
- Drops file in Windows directory
- Modifies registry class
PID:1196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"88⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE89⤵
- Checks computer location settings
PID:1852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"90⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE91⤵PID:1244
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"92⤵PID:4276
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE93⤵
- Modifies registry class
PID:5048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"94⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE95⤵
- Checks computer location settings
- Modifies registry class
PID:4780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"96⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE97⤵
- Checks computer location settings
- Modifies registry class
PID:5092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"98⤵
- Drops file in Windows directory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE99⤵PID:4512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"100⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE101⤵PID:4916
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"102⤵PID:3120
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE103⤵
- Modifies registry class
PID:4492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"104⤵
- Drops file in Windows directory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE105⤵PID:3076
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"106⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE107⤵
- Checks computer location settings
- Modifies registry class
PID:1216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"108⤵
- Drops file in Windows directory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE109⤵PID:3696
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"110⤵
- Drops file in Windows directory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE111⤵
- Checks computer location settings
- Modifies registry class
PID:4844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"112⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE113⤵
- Checks computer location settings
- Modifies registry class
PID:1192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"114⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE115⤵
- Checks computer location settings
- Modifies registry class
PID:4504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"116⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE117⤵
- Checks computer location settings
- Drops file in Windows directory
PID:1220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"118⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE119⤵
- Drops file in Windows directory
PID:3600 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"120⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE121⤵
- Modifies registry class
PID:1580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"122⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE123⤵
- Modifies registry class
PID:2344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"124⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE125⤵
- Modifies registry class
PID:3956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"126⤵PID:2640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE127⤵PID:3076
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"128⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE129⤵
- Checks computer location settings
- Modifies registry class
PID:2848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"130⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE131⤵PID:2224
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"132⤵
- Drops file in Windows directory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE133⤵
- Checks computer location settings
- Modifies registry class
PID:1192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"134⤵
- Drops file in Windows directory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE135⤵
- Checks computer location settings
- Modifies registry class
PID:212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"136⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE137⤵
- Modifies registry class
PID:672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"138⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE139⤵PID:4780
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"140⤵
- Drops file in Windows directory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE141⤵
- Drops file in Windows directory
- Modifies registry class
PID:4572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"142⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE143⤵
- Checks computer location settings
PID:1880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"144⤵PID:4492
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE145⤵
- Checks computer location settings
- Modifies registry class
PID:4720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"146⤵
- Drops file in Windows directory
PID:404 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE147⤵
- Drops file in Windows directory
PID:1608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"148⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE149⤵PID:4624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"150⤵
- Drops file in Windows directory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE151⤵PID:4332
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"152⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE153⤵PID:2636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"154⤵PID:2860
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE155⤵
- Checks computer location settings
PID:1840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"156⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE157⤵
- Modifies registry class
PID:4776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"158⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE159⤵
- Drops file in Windows directory
PID:3424 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"160⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE161⤵
- Drops file in Windows directory
PID:1284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"162⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE163⤵
- Modifies registry class
PID:5012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"164⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE165⤵
- Modifies registry class
PID:3028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"166⤵
- Drops file in Windows directory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE167⤵
- Modifies registry class
PID:3340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"168⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE169⤵PID:384
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"170⤵
- Drops file in Windows directory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE171⤵
- Checks computer location settings
PID:2096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"172⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE173⤵
- Modifies registry class
PID:1580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"174⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE175⤵
- Checks computer location settings
PID:4772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"176⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE177⤵
- Checks computer location settings
PID:4944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"178⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE179⤵PID:3260
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"180⤵PID:3876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE181⤵
- Drops file in Windows directory
- Modifies registry class
PID:1192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"182⤵
- Drops file in Windows directory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE183⤵
- Drops file in Windows directory
- Modifies registry class
PID:2196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"184⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE185⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2232 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"186⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE187⤵
- Modifies registry class
PID:4264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"188⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE189⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:4316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"190⤵PID:3620
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE191⤵PID:1408
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"192⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE193⤵PID:2756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"194⤵
- Drops file in Windows directory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE195⤵
- Drops file in Windows directory
- Modifies registry class
PID:4804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"196⤵
- Drops file in Windows directory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE197⤵
- Checks computer location settings
PID:2748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"198⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE199⤵
- Checks computer location settings
- Modifies registry class
PID:1524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"200⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE201⤵
- Checks computer location settings
PID:3120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"202⤵
- Drops file in Windows directory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE203⤵PID:4116
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"204⤵
- Drops file in Windows directory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE205⤵
- Checks computer location settings
PID:2216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"206⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE207⤵
- Checks computer location settings
- Modifies registry class
PID:1880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"208⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE209⤵
- Drops file in Windows directory
PID:2596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"210⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE211⤵
- Checks computer location settings
PID:4972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"212⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE213⤵
- Checks computer location settings
PID:2156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"214⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE215⤵
- Checks computer location settings
- Modifies registry class
PID:2748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"216⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE217⤵
- Modifies registry class
PID:1524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"218⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE219⤵
- Checks computer location settings
PID:2344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"220⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE221⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"222⤵PID:4004
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE223⤵
- Checks computer location settings
PID:1348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"224⤵
- Drops file in Windows directory
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE225⤵
- Checks computer location settings
- Modifies registry class
PID:1056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"226⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE227⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"228⤵PID:3260
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE229⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:3736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"230⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE231⤵
- Checks computer location settings
PID:4588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"232⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE233⤵PID:3028
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"234⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE235⤵
- Checks computer location settings
PID:3156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"236⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE237⤵
- Checks computer location settings
PID:3132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"238⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE239⤵
- Checks computer location settings
- Modifies registry class
PID:4492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE"240⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\34628C~1.EXE241⤵
- Checks computer location settings
PID:2964 -