Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-11-2024 00:27
Behavioral task
behavioral1
Sample
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe
Resource
win10v2004-20241007-en
General
-
Target
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe
-
Size
253KB
-
MD5
d54b7905893774b4896e54bf5c75d790
-
SHA1
e074def1b0083e3ee24a264904891540d8101d12
-
SHA256
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a
-
SHA512
8f99bfc222db409553af25bceb1ee3866f5a9dd4fead718b37da636f97c0a045346c4083cce566a8e383f37afa1751506aea8670feeb124e3ee19ef2c96cf96c
-
SSDEEP
3072:sr85CwBxR1qJmcv8fyOolexayyyyjU1eEYr85C:k9wBxRTcv8faIAH9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule behavioral1/files/0x000800000001707c-9.dat family_neshta behavioral1/files/0x00080000000173f3-15.dat family_neshta behavioral1/files/0x0001000000010314-20.dat family_neshta behavioral1/files/0x0001000000010312-19.dat family_neshta behavioral1/files/0x000700000001033a-18.dat family_neshta behavioral1/files/0x0022000000010678-17.dat family_neshta behavioral1/memory/2696-31-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2924-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2596-45-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2792-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1716-59-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/648-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2960-73-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1252-72-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/352-86-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2236-87-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2904-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2380-101-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x000100000000f7d3-112.dat family_neshta behavioral1/files/0x000100000000f7d8-120.dat family_neshta behavioral1/files/0x000100000000f776-121.dat family_neshta behavioral1/files/0x000100000000f7ca-122.dat family_neshta behavioral1/memory/1836-128-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/880-127-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x000100000000f7e6-123.dat family_neshta behavioral1/files/0x000100000000f82d-142.dat family_neshta behavioral1/memory/2152-150-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1652-149-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1096-166-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1320-167-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2024-180-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1176-179-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1812-194-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1172-193-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1744-206-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2104-205-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2344-223-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2284-221-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/812-240-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/720-241-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2820-259-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2856-260-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2576-267-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2600-268-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2700-283-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2632-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2620-291-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2952-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/648-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2144-300-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1264-308-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1064-307-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1168-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1532-316-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2564-324-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2880-323-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2884-332-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2416-331-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1832-339-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1960-340-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3004-353-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1840-352-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2192-356-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2484-355-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
Processes:
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exesvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.compid Process 2812 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 2696 svchost.com 2924 723254~1.EXE 2792 svchost.com 2596 723254~1.EXE 1716 svchost.com 648 723254~1.EXE 2960 svchost.com 1252 723254~1.EXE 2236 svchost.com 352 723254~1.EXE 2380 svchost.com 2904 723254~1.EXE 1836 svchost.com 880 723254~1.EXE 1652 svchost.com 2152 723254~1.EXE 1320 svchost.com 1096 723254~1.EXE 2024 svchost.com 1176 723254~1.EXE 1812 svchost.com 1172 723254~1.EXE 1744 svchost.com 2104 723254~1.EXE 2344 svchost.com 2284 723254~1.EXE 720 svchost.com 812 723254~1.EXE 2856 svchost.com 2820 723254~1.EXE 2600 svchost.com 2576 723254~1.EXE 2632 svchost.com 2700 723254~1.EXE 2620 svchost.com 2952 723254~1.EXE 648 svchost.com 2144 723254~1.EXE 1264 svchost.com 1064 723254~1.EXE 1532 svchost.com 1168 723254~1.EXE 2564 svchost.com 2880 723254~1.EXE 2884 svchost.com 2416 723254~1.EXE 1832 svchost.com 1960 723254~1.EXE 1840 svchost.com 3004 723254~1.EXE 2192 svchost.com 2484 723254~1.EXE 444 svchost.com 1580 723254~1.EXE 1132 svchost.com 1396 723254~1.EXE 1104 svchost.com 1048 723254~1.EXE 2024 svchost.com 1764 723254~1.EXE 2868 svchost.com 1172 723254~1.EXE 1684 svchost.com -
Loads dropped DLL 64 IoCs
Processes:
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.compid Process 1804 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 1804 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 2696 svchost.com 2696 svchost.com 2792 svchost.com 2792 svchost.com 1716 svchost.com 1716 svchost.com 2960 svchost.com 2960 svchost.com 2236 svchost.com 2236 svchost.com 2380 svchost.com 2380 svchost.com 1836 svchost.com 1836 svchost.com 1804 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 2812 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 2812 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 1652 svchost.com 1652 svchost.com 2812 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 1320 svchost.com 1320 svchost.com 2812 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 2024 svchost.com 2024 svchost.com 1812 svchost.com 1812 svchost.com 2812 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 1744 svchost.com 1744 svchost.com 2344 svchost.com 2344 svchost.com 720 svchost.com 720 svchost.com 2856 svchost.com 2856 svchost.com 2812 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 2600 svchost.com 2600 svchost.com 2632 svchost.com 2632 svchost.com 2620 svchost.com 2620 svchost.com 648 svchost.com 648 svchost.com 1264 svchost.com 1264 svchost.com 1532 svchost.com 1532 svchost.com 2564 svchost.com 2564 svchost.com 2884 svchost.com 2884 svchost.com 1832 svchost.com 1832 svchost.com 1840 svchost.com 1840 svchost.com 2192 svchost.com 2192 svchost.com 444 svchost.com 444 svchost.com 1132 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exedescription ioc Process File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe -
Drops file in Windows directory 64 IoCs
Processes:
723254~1.EXEsvchost.comsvchost.comsvchost.com723254~1.EXEsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXE723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXE723254~1.EXEsvchost.com723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXEsvchost.comsvchost.comsvchost.com723254~1.EXEsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com723254~1.EXEsvchost.com723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXEsvchost.com723254~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comdescription ioc Process File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
723254~1.EXEsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXE723254~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXE723254~1.EXEsvchost.com723254~1.EXEsvchost.comsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXE723254~1.EXE723254~1.EXEsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.comsvchost.com723254~1.EXE723254~1.EXE723254~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXEsvchost.com723254~1.EXE723254~1.EXEsvchost.comdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 1 IoCs
Processes:
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
723254~1.EXEpid Process 2696 723254~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exesvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEdescription pid Process procid_target PID 1804 wrote to memory of 2812 1804 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 31 PID 1804 wrote to memory of 2812 1804 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 31 PID 1804 wrote to memory of 2812 1804 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 31 PID 1804 wrote to memory of 2812 1804 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 31 PID 2812 wrote to memory of 2696 2812 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 32 PID 2812 wrote to memory of 2696 2812 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 32 PID 2812 wrote to memory of 2696 2812 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 32 PID 2812 wrote to memory of 2696 2812 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 32 PID 2696 wrote to memory of 2924 2696 svchost.com 33 PID 2696 wrote to memory of 2924 2696 svchost.com 33 PID 2696 wrote to memory of 2924 2696 svchost.com 33 PID 2696 wrote to memory of 2924 2696 svchost.com 33 PID 2924 wrote to memory of 2792 2924 723254~1.EXE 34 PID 2924 wrote to memory of 2792 2924 723254~1.EXE 34 PID 2924 wrote to memory of 2792 2924 723254~1.EXE 34 PID 2924 wrote to memory of 2792 2924 723254~1.EXE 34 PID 2792 wrote to memory of 2596 2792 svchost.com 35 PID 2792 wrote to memory of 2596 2792 svchost.com 35 PID 2792 wrote to memory of 2596 2792 svchost.com 35 PID 2792 wrote to memory of 2596 2792 svchost.com 35 PID 2596 wrote to memory of 1716 2596 723254~1.EXE 36 PID 2596 wrote to memory of 1716 2596 723254~1.EXE 36 PID 2596 wrote to memory of 1716 2596 723254~1.EXE 36 PID 2596 wrote to memory of 1716 2596 723254~1.EXE 36 PID 1716 wrote to memory of 648 1716 svchost.com 68 PID 1716 wrote to memory of 648 1716 svchost.com 68 PID 1716 wrote to memory of 648 1716 svchost.com 68 PID 1716 wrote to memory of 648 1716 svchost.com 68 PID 648 wrote to memory of 2960 648 723254~1.EXE 38 PID 648 wrote to memory of 2960 648 723254~1.EXE 38 PID 648 wrote to memory of 2960 648 723254~1.EXE 38 PID 648 wrote to memory of 2960 648 723254~1.EXE 38 PID 2960 wrote to memory of 1252 2960 svchost.com 39 PID 2960 wrote to memory of 1252 2960 svchost.com 39 PID 2960 wrote to memory of 1252 2960 svchost.com 39 PID 2960 wrote to memory of 1252 2960 svchost.com 39 PID 1252 wrote to memory of 2236 1252 723254~1.EXE 40 PID 1252 wrote to memory of 2236 1252 723254~1.EXE 40 PID 1252 wrote to memory of 2236 1252 723254~1.EXE 40 PID 1252 wrote to memory of 2236 1252 723254~1.EXE 40 PID 2236 wrote to memory of 352 2236 svchost.com 118 PID 2236 wrote to memory of 352 2236 svchost.com 118 PID 2236 wrote to memory of 352 2236 svchost.com 118 PID 2236 wrote to memory of 352 2236 svchost.com 118 PID 352 wrote to memory of 2380 352 723254~1.EXE 42 PID 352 wrote to memory of 2380 352 723254~1.EXE 42 PID 352 wrote to memory of 2380 352 723254~1.EXE 42 PID 352 wrote to memory of 2380 352 723254~1.EXE 42 PID 2380 wrote to memory of 2904 2380 svchost.com 43 PID 2380 wrote to memory of 2904 2380 svchost.com 43 PID 2380 wrote to memory of 2904 2380 svchost.com 43 PID 2380 wrote to memory of 2904 2380 svchost.com 43 PID 2904 wrote to memory of 1836 2904 723254~1.EXE 123 PID 2904 wrote to memory of 1836 2904 723254~1.EXE 123 PID 2904 wrote to memory of 1836 2904 723254~1.EXE 123 PID 2904 wrote to memory of 1836 2904 723254~1.EXE 123 PID 1836 wrote to memory of 880 1836 svchost.com 124 PID 1836 wrote to memory of 880 1836 svchost.com 124 PID 1836 wrote to memory of 880 1836 svchost.com 124 PID 1836 wrote to memory of 880 1836 svchost.com 124 PID 880 wrote to memory of 1652 880 723254~1.EXE 46 PID 880 wrote to memory of 1652 880 723254~1.EXE 46 PID 880 wrote to memory of 1652 880 723254~1.EXE 46 PID 880 wrote to memory of 1652 880 723254~1.EXE 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe"C:\Users\Admin\AppData\Local\Temp\7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE18⤵
- Executes dropped EXE
PID:2152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE20⤵
- Executes dropped EXE
PID:1096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE22⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1176 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE28⤵
- Executes dropped EXE
PID:2284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE30⤵
- Executes dropped EXE
PID:812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE32⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE36⤵
- Executes dropped EXE
PID:2700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE38⤵
- Executes dropped EXE
PID:2952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:648 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE40⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2144 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE44⤵
- Executes dropped EXE
PID:1168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE46⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE48⤵
- Executes dropped EXE
PID:2416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE50⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE52⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE54⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE58⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1396 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"59⤵
- Executes dropped EXE
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE60⤵
- Executes dropped EXE
PID:1048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"61⤵
- Executes dropped EXE
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE62⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"63⤵
- Executes dropped EXE
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"65⤵
- Executes dropped EXE
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE66⤵
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"67⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE68⤵
- Drops file in Windows directory
PID:2396 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"69⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE70⤵
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"71⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE72⤵PID:2468
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"73⤵
- Drops file in Windows directory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE74⤵PID:2992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"75⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE76⤵PID:2820
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"77⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE78⤵
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"79⤵PID:2792
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE80⤵PID:1696
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"81⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE82⤵PID:2964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"83⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE84⤵
- System Location Discovery: System Language Discovery
PID:2296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"85⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE86⤵PID:2300
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"87⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE88⤵
- System Location Discovery: System Language Discovery
PID:572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"89⤵
- Drops file in Windows directory
PID:352 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE90⤵PID:376
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"91⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE92⤵PID:600
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"93⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE94⤵PID:1836
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"95⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE96⤵PID:2224
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"97⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE98⤵PID:1156
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"99⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE100⤵
- Drops file in Windows directory
PID:1940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"101⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE102⤵PID:1096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"103⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE104⤵
- System Location Discovery: System Language Discovery
PID:1796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"105⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE106⤵PID:1176
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"107⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE108⤵PID:1344
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"109⤵
- Drops file in Windows directory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE110⤵PID:1992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"111⤵PID:1012
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE112⤵PID:2496
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"113⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE114⤵
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"115⤵
- System Location Discovery: System Language Discovery
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE116⤵
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"117⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE118⤵PID:2840
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"119⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE120⤵PID:2612
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"121⤵
- Drops file in Windows directory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE122⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2776
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-