Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 00:45
Static task
static1
Behavioral task
behavioral1
Sample
7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe
Resource
win10v2004-20241007-en
General
-
Target
7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe
-
Size
265KB
-
MD5
2e74c916bee35d5b748ddde7e555693e
-
SHA1
d14604184262d1d42df9e9c9ad41b8b7fbdc0ed8
-
SHA256
7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd
-
SHA512
b5c8ca23f1ab8e6fab182d33c1cf6ade51450b0f9000191288462072308843c8c505021ef5f018524d522ed2e376133434415348e74706714b55c9807612b038
-
SSDEEP
3072:zr8WDrCbzmm71+7Xj4HOb+wlCXv3hVvr8WDrC:Pud7YXj4iRlqJu
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 2248 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 2904 svchost.com 2900 7DF959~1.EXE 2848 svchost.com 2812 7DF959~1.EXE 2568 svchost.com 2980 7DF959~1.EXE 1028 svchost.com 876 7DF959~1.EXE 936 svchost.com 2840 7DF959~1.EXE 2536 svchost.com 1228 7DF959~1.EXE 2872 svchost.com 376 7DF959~1.EXE 1696 svchost.com 1648 7DF959~1.EXE 2256 svchost.com 1164 7DF959~1.EXE 1812 svchost.com 1808 7DF959~1.EXE 1544 svchost.com 3012 7DF959~1.EXE 2508 svchost.com 1616 7DF959~1.EXE 2516 svchost.com 2464 7DF959~1.EXE 1156 svchost.com 568 7DF959~1.EXE 896 svchost.com 1768 7DF959~1.EXE 1600 svchost.com 2748 7DF959~1.EXE 2824 svchost.com 2576 7DF959~1.EXE 2564 svchost.com 2156 7DF959~1.EXE 2424 svchost.com 564 7DF959~1.EXE 332 svchost.com 1324 7DF959~1.EXE 576 svchost.com 2840 7DF959~1.EXE 1276 svchost.com 1044 7DF959~1.EXE 1308 svchost.com 2336 7DF959~1.EXE 1708 svchost.com 2844 7DF959~1.EXE 2820 svchost.com 2396 7DF959~1.EXE 1644 svchost.com 1656 7DF959~1.EXE 2188 svchost.com 2104 7DF959~1.EXE 3032 svchost.com 2236 7DF959~1.EXE 2044 svchost.com 2040 7DF959~1.EXE 1104 svchost.com 1812 7DF959~1.EXE 1140 svchost.com 2864 7DF959~1.EXE 996 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 2220 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 2220 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 2904 svchost.com 2904 svchost.com 2848 svchost.com 2848 svchost.com 2568 svchost.com 2568 svchost.com 1028 svchost.com 1028 svchost.com 936 svchost.com 936 svchost.com 2536 svchost.com 2536 svchost.com 2872 svchost.com 2872 svchost.com 2248 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 2220 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 1696 svchost.com 1696 svchost.com 2256 svchost.com 2256 svchost.com 1812 svchost.com 1812 svchost.com 1544 svchost.com 1544 svchost.com 2508 svchost.com 2508 svchost.com 2516 svchost.com 2516 svchost.com 1156 svchost.com 1156 svchost.com 896 svchost.com 896 svchost.com 1600 svchost.com 2220 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 1600 svchost.com 2824 svchost.com 2824 svchost.com 2564 svchost.com 2564 svchost.com 2424 svchost.com 2424 svchost.com 332 svchost.com 332 svchost.com 576 svchost.com 576 svchost.com 1276 svchost.com 1276 svchost.com 1308 svchost.com 1308 svchost.com 1708 svchost.com 1708 svchost.com 2820 svchost.com 2820 svchost.com 1644 svchost.com 1644 svchost.com 2188 svchost.com 2188 svchost.com 3032 svchost.com 3032 svchost.com 2044 svchost.com 2044 svchost.com 1104 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2248 2220 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 30 PID 2220 wrote to memory of 2248 2220 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 30 PID 2220 wrote to memory of 2248 2220 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 30 PID 2220 wrote to memory of 2248 2220 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 30 PID 2248 wrote to memory of 2904 2248 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 31 PID 2248 wrote to memory of 2904 2248 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 31 PID 2248 wrote to memory of 2904 2248 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 31 PID 2248 wrote to memory of 2904 2248 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 31 PID 2904 wrote to memory of 2900 2904 svchost.com 32 PID 2904 wrote to memory of 2900 2904 svchost.com 32 PID 2904 wrote to memory of 2900 2904 svchost.com 32 PID 2904 wrote to memory of 2900 2904 svchost.com 32 PID 2900 wrote to memory of 2848 2900 7DF959~1.EXE 33 PID 2900 wrote to memory of 2848 2900 7DF959~1.EXE 33 PID 2900 wrote to memory of 2848 2900 7DF959~1.EXE 33 PID 2900 wrote to memory of 2848 2900 7DF959~1.EXE 33 PID 2848 wrote to memory of 2812 2848 svchost.com 34 PID 2848 wrote to memory of 2812 2848 svchost.com 34 PID 2848 wrote to memory of 2812 2848 svchost.com 34 PID 2848 wrote to memory of 2812 2848 svchost.com 34 PID 2812 wrote to memory of 2568 2812 7DF959~1.EXE 35 PID 2812 wrote to memory of 2568 2812 7DF959~1.EXE 35 PID 2812 wrote to memory of 2568 2812 7DF959~1.EXE 35 PID 2812 wrote to memory of 2568 2812 7DF959~1.EXE 35 PID 2568 wrote to memory of 2980 2568 svchost.com 36 PID 2568 wrote to memory of 2980 2568 svchost.com 36 PID 2568 wrote to memory of 2980 2568 svchost.com 36 PID 2568 wrote to memory of 2980 2568 svchost.com 36 PID 2980 wrote to memory of 1028 2980 7DF959~1.EXE 37 PID 2980 wrote to memory of 1028 2980 7DF959~1.EXE 37 PID 2980 wrote to memory of 1028 2980 7DF959~1.EXE 37 PID 2980 wrote to memory of 1028 2980 7DF959~1.EXE 37 PID 1028 wrote to memory of 876 1028 svchost.com 117 PID 1028 wrote to memory of 876 1028 svchost.com 117 PID 1028 wrote to memory of 876 1028 svchost.com 117 PID 1028 wrote to memory of 876 1028 svchost.com 117 PID 876 wrote to memory of 936 876 7DF959~1.EXE 39 PID 876 wrote to memory of 936 876 7DF959~1.EXE 39 PID 876 wrote to memory of 936 876 7DF959~1.EXE 39 PID 876 wrote to memory of 936 876 7DF959~1.EXE 39 PID 936 wrote to memory of 2840 936 svchost.com 72 PID 936 wrote to memory of 2840 936 svchost.com 72 PID 936 wrote to memory of 2840 936 svchost.com 72 PID 936 wrote to memory of 2840 936 svchost.com 72 PID 2840 wrote to memory of 2536 2840 7DF959~1.EXE 41 PID 2840 wrote to memory of 2536 2840 7DF959~1.EXE 41 PID 2840 wrote to memory of 2536 2840 7DF959~1.EXE 41 PID 2840 wrote to memory of 2536 2840 7DF959~1.EXE 41 PID 2536 wrote to memory of 1228 2536 svchost.com 42 PID 2536 wrote to memory of 1228 2536 svchost.com 42 PID 2536 wrote to memory of 1228 2536 svchost.com 42 PID 2536 wrote to memory of 1228 2536 svchost.com 42 PID 1228 wrote to memory of 2872 1228 7DF959~1.EXE 43 PID 1228 wrote to memory of 2872 1228 7DF959~1.EXE 43 PID 1228 wrote to memory of 2872 1228 7DF959~1.EXE 43 PID 1228 wrote to memory of 2872 1228 7DF959~1.EXE 43 PID 2872 wrote to memory of 376 2872 svchost.com 44 PID 2872 wrote to memory of 376 2872 svchost.com 44 PID 2872 wrote to memory of 376 2872 svchost.com 44 PID 2872 wrote to memory of 376 2872 svchost.com 44 PID 376 wrote to memory of 1696 376 7DF959~1.EXE 45 PID 376 wrote to memory of 1696 376 7DF959~1.EXE 45 PID 376 wrote to memory of 1696 376 7DF959~1.EXE 45 PID 376 wrote to memory of 1696 376 7DF959~1.EXE 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe"C:\Users\Admin\AppData\Local\Temp\7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:376 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE18⤵
- Executes dropped EXE
PID:1648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE20⤵
- Executes dropped EXE
PID:1164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE22⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE24⤵
- Executes dropped EXE
PID:3012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE26⤵
- Executes dropped EXE
PID:1616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE28⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE30⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:896 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE36⤵
- Executes dropped EXE
PID:2576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE38⤵
- Executes dropped EXE
PID:2156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE40⤵
- Executes dropped EXE
PID:564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:332 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE42⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE46⤵
- Executes dropped EXE
PID:1044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE48⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE50⤵
- Executes dropped EXE
PID:2844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE54⤵
- Executes dropped EXE
PID:1656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE58⤵
- Executes dropped EXE
PID:2236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"59⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE62⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"63⤵
- Executes dropped EXE
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE64⤵
- Executes dropped EXE
PID:2864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"65⤵
- Executes dropped EXE
PID:996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE66⤵PID:920
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"67⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE68⤵PID:3020
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"69⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE70⤵PID:2464
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"71⤵
- Drops file in Windows directory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE72⤵PID:1756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"73⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE74⤵PID:2512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"75⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE76⤵PID:2680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"77⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE78⤵PID:2684
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"79⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE80⤵PID:2716
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"81⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE82⤵
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"83⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE84⤵PID:2604
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"85⤵
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE86⤵PID:2580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"87⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE88⤵PID:2988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"89⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE90⤵PID:584
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"91⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE92⤵PID:2452
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"93⤵PID:1212
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE94⤵PID:2028
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"95⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE96⤵PID:1800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"97⤵PID:2612
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE98⤵PID:2320
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE100⤵PID:1732
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"101⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE102⤵PID:2528
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"103⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE104⤵PID:2180
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"105⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE106⤵PID:2036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"107⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE108⤵PID:2928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"109⤵
- Drops file in Windows directory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE110⤵PID:2952
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"111⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE112⤵PID:916
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"113⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE114⤵PID:844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"115⤵
- Drops file in Windows directory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE116⤵PID:2448
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"117⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE118⤵PID:2440
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"119⤵PID:1156
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE120⤵PID:2312
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"121⤵
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE122⤵PID:2752
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-