Analysis
-
max time kernel
121s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 00:36
Static task
static1
Behavioral task
behavioral1
Sample
7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe
Resource
win10v2004-20241007-en
General
-
Target
7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe
-
Size
265KB
-
MD5
2e74c916bee35d5b748ddde7e555693e
-
SHA1
d14604184262d1d42df9e9c9ad41b8b7fbdc0ed8
-
SHA256
7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd
-
SHA512
b5c8ca23f1ab8e6fab182d33c1cf6ade51450b0f9000191288462072308843c8c505021ef5f018524d522ed2e376133434415348e74706714b55c9807612b038
-
SSDEEP
3072:zr8WDrCbzmm71+7Xj4HOb+wlCXv3hVvr8WDrC:Pud7YXj4iRlqJu
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 2000 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 2848 svchost.com 2076 7DF959~1.EXE 1752 svchost.com 1608 7DF959~1.EXE 2896 svchost.com 2948 7DF959~1.EXE 2704 svchost.com 2732 7DF959~1.EXE 2804 svchost.com 1564 7DF959~1.EXE 2536 svchost.com 2264 7DF959~1.EXE 2444 svchost.com 1744 7DF959~1.EXE 660 svchost.com 1812 7DF959~1.EXE 1284 svchost.com 1796 7DF959~1.EXE 2304 svchost.com 2724 7DF959~1.EXE 2124 svchost.com 440 7DF959~1.EXE 1712 svchost.com 1596 7DF959~1.EXE 1516 svchost.com 2064 7DF959~1.EXE 1012 svchost.com 2996 7DF959~1.EXE 2988 svchost.com 1540 7DF959~1.EXE 1732 svchost.com 1716 7DF959~1.EXE 2312 svchost.com 1664 7DF959~1.EXE 2272 svchost.com 2104 7DF959~1.EXE 1612 svchost.com 2592 7DF959~1.EXE 2588 svchost.com 2636 7DF959~1.EXE 2684 svchost.com 2704 7DF959~1.EXE 2644 svchost.com 2648 7DF959~1.EXE 2548 svchost.com 2884 7DF959~1.EXE 2360 svchost.com 2536 7DF959~1.EXE 2428 svchost.com 2892 7DF959~1.EXE 1912 svchost.com 2452 7DF959~1.EXE 2416 svchost.com 292 7DF959~1.EXE 2028 svchost.com 1592 7DF959~1.EXE 1844 svchost.com 1972 7DF959~1.EXE 2776 svchost.com 2320 7DF959~1.EXE 3064 svchost.com 1300 7DF959~1.EXE 1636 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 2872 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 2872 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 2848 svchost.com 2848 svchost.com 1752 svchost.com 1752 svchost.com 2896 svchost.com 2896 svchost.com 2704 svchost.com 2704 svchost.com 2804 svchost.com 2804 svchost.com 2536 svchost.com 2536 svchost.com 2000 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 2444 svchost.com 2444 svchost.com 2872 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 2000 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 660 svchost.com 660 svchost.com 1284 svchost.com 1284 svchost.com 2304 svchost.com 2304 svchost.com 2124 svchost.com 2124 svchost.com 1712 svchost.com 1712 svchost.com 1516 svchost.com 1516 svchost.com 2872 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 1012 svchost.com 1012 svchost.com 2988 svchost.com 2988 svchost.com 2000 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 1732 svchost.com 1732 svchost.com 2312 svchost.com 2312 svchost.com 2000 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 2272 svchost.com 2272 svchost.com 2000 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 1612 svchost.com 1612 svchost.com 2000 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 2588 svchost.com 2588 svchost.com 2684 svchost.com 2684 svchost.com 2644 svchost.com 2644 svchost.com 2548 svchost.com 2548 svchost.com 2360 svchost.com 2360 svchost.com 2428 svchost.com 2428 svchost.com 1912 svchost.com 1912 svchost.com 2416 svchost.com 2416 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\svchost.com 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7DF959~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7DF959~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7DF959~1.EXE -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2872 wrote to memory of 2000 2872 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 28 PID 2872 wrote to memory of 2000 2872 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 28 PID 2872 wrote to memory of 2000 2872 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 28 PID 2872 wrote to memory of 2000 2872 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 28 PID 2000 wrote to memory of 2848 2000 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 29 PID 2000 wrote to memory of 2848 2000 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 29 PID 2000 wrote to memory of 2848 2000 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 29 PID 2000 wrote to memory of 2848 2000 7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe 29 PID 2848 wrote to memory of 2076 2848 svchost.com 30 PID 2848 wrote to memory of 2076 2848 svchost.com 30 PID 2848 wrote to memory of 2076 2848 svchost.com 30 PID 2848 wrote to memory of 2076 2848 svchost.com 30 PID 2076 wrote to memory of 1752 2076 7DF959~1.EXE 31 PID 2076 wrote to memory of 1752 2076 7DF959~1.EXE 31 PID 2076 wrote to memory of 1752 2076 7DF959~1.EXE 31 PID 2076 wrote to memory of 1752 2076 7DF959~1.EXE 31 PID 1752 wrote to memory of 1608 1752 svchost.com 32 PID 1752 wrote to memory of 1608 1752 svchost.com 32 PID 1752 wrote to memory of 1608 1752 svchost.com 32 PID 1752 wrote to memory of 1608 1752 svchost.com 32 PID 1608 wrote to memory of 2896 1608 7DF959~1.EXE 33 PID 1608 wrote to memory of 2896 1608 7DF959~1.EXE 33 PID 1608 wrote to memory of 2896 1608 7DF959~1.EXE 33 PID 1608 wrote to memory of 2896 1608 7DF959~1.EXE 33 PID 2896 wrote to memory of 2948 2896 svchost.com 34 PID 2896 wrote to memory of 2948 2896 svchost.com 34 PID 2896 wrote to memory of 2948 2896 svchost.com 34 PID 2896 wrote to memory of 2948 2896 svchost.com 34 PID 2948 wrote to memory of 2704 2948 7DF959~1.EXE 70 PID 2948 wrote to memory of 2704 2948 7DF959~1.EXE 70 PID 2948 wrote to memory of 2704 2948 7DF959~1.EXE 70 PID 2948 wrote to memory of 2704 2948 7DF959~1.EXE 70 PID 2704 wrote to memory of 2732 2704 svchost.com 36 PID 2704 wrote to memory of 2732 2704 svchost.com 36 PID 2704 wrote to memory of 2732 2704 svchost.com 36 PID 2704 wrote to memory of 2732 2704 svchost.com 36 PID 2732 wrote to memory of 2804 2732 7DF959~1.EXE 37 PID 2732 wrote to memory of 2804 2732 7DF959~1.EXE 37 PID 2732 wrote to memory of 2804 2732 7DF959~1.EXE 37 PID 2732 wrote to memory of 2804 2732 7DF959~1.EXE 37 PID 2804 wrote to memory of 1564 2804 svchost.com 38 PID 2804 wrote to memory of 1564 2804 svchost.com 38 PID 2804 wrote to memory of 1564 2804 svchost.com 38 PID 2804 wrote to memory of 1564 2804 svchost.com 38 PID 1564 wrote to memory of 2536 1564 7DF959~1.EXE 76 PID 1564 wrote to memory of 2536 1564 7DF959~1.EXE 76 PID 1564 wrote to memory of 2536 1564 7DF959~1.EXE 76 PID 1564 wrote to memory of 2536 1564 7DF959~1.EXE 76 PID 2536 wrote to memory of 2264 2536 svchost.com 40 PID 2536 wrote to memory of 2264 2536 svchost.com 40 PID 2536 wrote to memory of 2264 2536 svchost.com 40 PID 2536 wrote to memory of 2264 2536 svchost.com 40 PID 2264 wrote to memory of 2444 2264 7DF959~1.EXE 41 PID 2264 wrote to memory of 2444 2264 7DF959~1.EXE 41 PID 2264 wrote to memory of 2444 2264 7DF959~1.EXE 41 PID 2264 wrote to memory of 2444 2264 7DF959~1.EXE 41 PID 2444 wrote to memory of 1744 2444 svchost.com 42 PID 2444 wrote to memory of 1744 2444 svchost.com 42 PID 2444 wrote to memory of 1744 2444 svchost.com 42 PID 2444 wrote to memory of 1744 2444 svchost.com 42 PID 1744 wrote to memory of 660 1744 7DF959~1.EXE 43 PID 1744 wrote to memory of 660 1744 7DF959~1.EXE 43 PID 1744 wrote to memory of 660 1744 7DF959~1.EXE 43 PID 1744 wrote to memory of 660 1744 7DF959~1.EXE 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe"C:\Users\Admin\AppData\Local\Temp\7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\7df9595e573db19694671785c063120b2be88409300c34809c89865f61a181cd.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE20⤵
- Executes dropped EXE
PID:1796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE22⤵
- Executes dropped EXE
PID:2724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE24⤵
- Executes dropped EXE
PID:440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE26⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE28⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE30⤵
- Executes dropped EXE
PID:2996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE32⤵
- Executes dropped EXE
PID:1540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE34⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE38⤵
- Executes dropped EXE
PID:2104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE42⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE44⤵
- Executes dropped EXE
PID:2704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE46⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE52⤵
- Executes dropped EXE
PID:2892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE54⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE56⤵
- Executes dropped EXE
PID:292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"57⤵
- Executes dropped EXE
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE58⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE60⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"63⤵
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1300 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"65⤵
- Executes dropped EXE
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE66⤵PID:1264
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"67⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE68⤵PID:1348
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"69⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE70⤵PID:1512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"71⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE72⤵PID:1032
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"73⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE74⤵PID:2216
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"75⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE76⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"77⤵
- Drops file in Windows directory
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE78⤵
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"79⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE80⤵PID:2260
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"81⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE82⤵
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE84⤵PID:2168
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"85⤵
- Drops file in Windows directory
PID:284 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE86⤵
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"87⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE88⤵PID:2612
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"89⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE90⤵PID:2896
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"91⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE92⤵PID:2700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"93⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE94⤵PID:2692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"95⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE96⤵PID:2732
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"97⤵
- Drops file in Windows directory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE98⤵PID:2548
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"99⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE100⤵PID:776
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"101⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE102⤵
- Drops file in Windows directory
PID:2528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"103⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE104⤵PID:2012
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"105⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE106⤵
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"107⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE108⤵
- Drops file in Windows directory
PID:2028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"109⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE110⤵PID:2140
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE112⤵PID:2544
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"113⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE114⤵
- Drops file in Windows directory
PID:872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"115⤵
- Drops file in Windows directory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE116⤵
- Drops file in Windows directory
PID:440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE118⤵PID:1960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"119⤵
- Drops file in Windows directory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE120⤵
- Drops file in Windows directory
PID:2164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE"121⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7DF959~1.EXE122⤵PID:2276
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-