Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 00:41
Behavioral task
behavioral1
Sample
7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe
Resource
win10v2004-20241007-en
General
-
Target
7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe
-
Size
301KB
-
MD5
408826cfe2454311f032f323a3f62e99
-
SHA1
547d37b16f499c68e9affe4de72b644bf5321cda
-
SHA256
7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd
-
SHA512
3056ef3263c0be2b528fb92f5ddef481136d182c71f192da4b88a392d0acad616226ce31e3b2c41bc7de21e79a6dd7b984deedd5b3217d55b65c73f00e52ef58
-
SSDEEP
3072:zr8WDrCxjoByFgAsaCRSkrmfAPXSPBIFXMN3uCo//9urTWuFsxihGrJW/UmTXItd:PuqchCReAPC0XMRqGWUlxTXb0bYu
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 936 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 2416 svchost.com 2996 7CFCC6~1.EXE 2712 svchost.com 2900 7CFCC6~1.EXE 2836 svchost.com 2604 7CFCC6~1.EXE 3008 svchost.com 2564 7CFCC6~1.EXE 2688 svchost.com 2612 7CFCC6~1.EXE 1700 svchost.com 2468 7CFCC6~1.EXE 1696 svchost.com 1796 7CFCC6~1.EXE 1452 svchost.com 2744 7CFCC6~1.EXE 2200 svchost.com 2052 7CFCC6~1.EXE 708 svchost.com 1868 7CFCC6~1.EXE 2912 svchost.com 2544 7CFCC6~1.EXE 2036 svchost.com 1860 7CFCC6~1.EXE 1844 svchost.com 2308 7CFCC6~1.EXE 588 svchost.com 1736 7CFCC6~1.EXE 2300 svchost.com 3068 7CFCC6~1.EXE 2424 svchost.com 2784 7CFCC6~1.EXE 2772 svchost.com 2824 7CFCC6~1.EXE 2592 svchost.com 2572 7CFCC6~1.EXE 2584 svchost.com 2564 7CFCC6~1.EXE 2984 svchost.com 1936 7CFCC6~1.EXE 1148 svchost.com 1372 7CFCC6~1.EXE 2512 svchost.com 2096 7CFCC6~1.EXE 1660 svchost.com 1036 7CFCC6~1.EXE 2500 svchost.com 864 7CFCC6~1.EXE 1608 svchost.com 1980 7CFCC6~1.EXE 2808 svchost.com 2656 7CFCC6~1.EXE 2396 svchost.com 2856 7CFCC6~1.EXE 2496 svchost.com 1968 7CFCC6~1.EXE 1504 svchost.com 1364 7CFCC6~1.EXE 1600 svchost.com 1864 7CFCC6~1.EXE 1772 svchost.com 2076 7CFCC6~1.EXE 1404 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 3004 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 3004 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 2416 svchost.com 2416 svchost.com 2712 svchost.com 2712 svchost.com 2836 svchost.com 2836 svchost.com 3008 svchost.com 3008 svchost.com 2688 svchost.com 2688 svchost.com 1700 svchost.com 1700 svchost.com 936 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 3004 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 1696 svchost.com 1696 svchost.com 3004 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 1452 svchost.com 1452 svchost.com 3004 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 2200 svchost.com 2200 svchost.com 708 svchost.com 708 svchost.com 3004 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 2912 svchost.com 2912 svchost.com 936 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 2036 svchost.com 2036 svchost.com 3004 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 1844 svchost.com 1844 svchost.com 936 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 588 svchost.com 588 svchost.com 2300 svchost.com 2300 svchost.com 2424 svchost.com 2424 svchost.com 936 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 2772 svchost.com 2772 svchost.com 2592 svchost.com 2592 svchost.com 2584 svchost.com 2584 svchost.com 2984 svchost.com 2984 svchost.com 1148 svchost.com 1148 svchost.com 2512 svchost.com 2512 svchost.com 1660 svchost.com 1660 svchost.com 2500 svchost.com 2500 svchost.com 1608 svchost.com 1608 svchost.com 2808 svchost.com 2808 svchost.com 2396 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral1/files/0x001600000001866f-2.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3004 wrote to memory of 936 3004 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 31 PID 3004 wrote to memory of 936 3004 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 31 PID 3004 wrote to memory of 936 3004 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 31 PID 3004 wrote to memory of 936 3004 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 31 PID 936 wrote to memory of 2416 936 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 32 PID 936 wrote to memory of 2416 936 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 32 PID 936 wrote to memory of 2416 936 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 32 PID 936 wrote to memory of 2416 936 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 32 PID 2416 wrote to memory of 2996 2416 svchost.com 33 PID 2416 wrote to memory of 2996 2416 svchost.com 33 PID 2416 wrote to memory of 2996 2416 svchost.com 33 PID 2416 wrote to memory of 2996 2416 svchost.com 33 PID 2996 wrote to memory of 2712 2996 7CFCC6~1.EXE 34 PID 2996 wrote to memory of 2712 2996 7CFCC6~1.EXE 34 PID 2996 wrote to memory of 2712 2996 7CFCC6~1.EXE 34 PID 2996 wrote to memory of 2712 2996 7CFCC6~1.EXE 34 PID 2712 wrote to memory of 2900 2712 svchost.com 35 PID 2712 wrote to memory of 2900 2712 svchost.com 35 PID 2712 wrote to memory of 2900 2712 svchost.com 35 PID 2712 wrote to memory of 2900 2712 svchost.com 35 PID 2900 wrote to memory of 2836 2900 7CFCC6~1.EXE 36 PID 2900 wrote to memory of 2836 2900 7CFCC6~1.EXE 36 PID 2900 wrote to memory of 2836 2900 7CFCC6~1.EXE 36 PID 2900 wrote to memory of 2836 2900 7CFCC6~1.EXE 36 PID 2836 wrote to memory of 2604 2836 svchost.com 37 PID 2836 wrote to memory of 2604 2836 svchost.com 37 PID 2836 wrote to memory of 2604 2836 svchost.com 37 PID 2836 wrote to memory of 2604 2836 svchost.com 37 PID 2604 wrote to memory of 3008 2604 7CFCC6~1.EXE 38 PID 2604 wrote to memory of 3008 2604 7CFCC6~1.EXE 38 PID 2604 wrote to memory of 3008 2604 7CFCC6~1.EXE 38 PID 2604 wrote to memory of 3008 2604 7CFCC6~1.EXE 38 PID 3008 wrote to memory of 2564 3008 svchost.com 69 PID 3008 wrote to memory of 2564 3008 svchost.com 69 PID 3008 wrote to memory of 2564 3008 svchost.com 69 PID 3008 wrote to memory of 2564 3008 svchost.com 69 PID 2564 wrote to memory of 2688 2564 7CFCC6~1.EXE 40 PID 2564 wrote to memory of 2688 2564 7CFCC6~1.EXE 40 PID 2564 wrote to memory of 2688 2564 7CFCC6~1.EXE 40 PID 2564 wrote to memory of 2688 2564 7CFCC6~1.EXE 40 PID 2688 wrote to memory of 2612 2688 svchost.com 41 PID 2688 wrote to memory of 2612 2688 svchost.com 41 PID 2688 wrote to memory of 2612 2688 svchost.com 41 PID 2688 wrote to memory of 2612 2688 svchost.com 41 PID 2612 wrote to memory of 1700 2612 7CFCC6~1.EXE 42 PID 2612 wrote to memory of 1700 2612 7CFCC6~1.EXE 42 PID 2612 wrote to memory of 1700 2612 7CFCC6~1.EXE 42 PID 2612 wrote to memory of 1700 2612 7CFCC6~1.EXE 42 PID 1700 wrote to memory of 2468 1700 svchost.com 43 PID 1700 wrote to memory of 2468 1700 svchost.com 43 PID 1700 wrote to memory of 2468 1700 svchost.com 43 PID 1700 wrote to memory of 2468 1700 svchost.com 43 PID 2468 wrote to memory of 1696 2468 7CFCC6~1.EXE 44 PID 2468 wrote to memory of 1696 2468 7CFCC6~1.EXE 44 PID 2468 wrote to memory of 1696 2468 7CFCC6~1.EXE 44 PID 2468 wrote to memory of 1696 2468 7CFCC6~1.EXE 44 PID 1696 wrote to memory of 1796 1696 svchost.com 45 PID 1696 wrote to memory of 1796 1696 svchost.com 45 PID 1696 wrote to memory of 1796 1696 svchost.com 45 PID 1696 wrote to memory of 1796 1696 svchost.com 45 PID 1796 wrote to memory of 1452 1796 7CFCC6~1.EXE 46 PID 1796 wrote to memory of 1452 1796 7CFCC6~1.EXE 46 PID 1796 wrote to memory of 1452 1796 7CFCC6~1.EXE 46 PID 1796 wrote to memory of 1452 1796 7CFCC6~1.EXE 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe"C:\Users\Admin\AppData\Local\Temp\7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE18⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE20⤵
- Executes dropped EXE
PID:2052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE22⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE24⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE26⤵
- Executes dropped EXE
PID:1860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE28⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE30⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE32⤵
- Executes dropped EXE
PID:3068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE34⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2784 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE38⤵
- Executes dropped EXE
PID:2572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE40⤵
- Executes dropped EXE
PID:2564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE42⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE44⤵
- Executes dropped EXE
PID:1372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE48⤵
- Executes dropped EXE
PID:1036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE52⤵
- Executes dropped EXE
PID:1980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE54⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE56⤵
- Executes dropped EXE
PID:2856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"57⤵
- Executes dropped EXE
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE58⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE60⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"61⤵
- Executes dropped EXE
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE62⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"63⤵
- Executes dropped EXE
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"65⤵
- Executes dropped EXE
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE66⤵PID:1812
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"67⤵
- Drops file in Windows directory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE68⤵PID:2460
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"69⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE70⤵PID:1860
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"71⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE72⤵PID:1692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"73⤵
- Drops file in Windows directory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE74⤵PID:2220
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE76⤵PID:2284
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"77⤵PID:3048
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE78⤵PID:2804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"79⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE80⤵PID:2676
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"81⤵
- Drops file in Windows directory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE82⤵PID:2900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"83⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE84⤵PID:2680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"85⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE86⤵
- Drops file in Windows directory
PID:2584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"87⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE88⤵PID:2984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"89⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE90⤵PID:1792
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"91⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE92⤵PID:1012
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"93⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE94⤵PID:1952
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"95⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE96⤵PID:1296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"97⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE98⤵PID:1408
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"99⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE100⤵PID:2012
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"101⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE102⤵PID:680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"103⤵PID:2856
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE104⤵PID:892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"105⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE106⤵PID:1944
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"107⤵
- Drops file in Windows directory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE108⤵
- System Location Discovery: System Language Discovery
PID:1868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"109⤵
- System Location Discovery: System Language Discovery
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE110⤵PID:788
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE112⤵PID:2072
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"113⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE114⤵PID:1928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"115⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE116⤵PID:896
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"117⤵
- Drops file in Windows directory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE118⤵PID:1584
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"119⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE120⤵PID:2120
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"121⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE122⤵PID:1512
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-