Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe
Resource
win10v2004-20241007-en
General
-
Target
8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe
-
Size
803KB
-
MD5
47d08da30094ecebe28a42af6b172dc6
-
SHA1
b0a56e72d5883818dbead15a30d2607adf76424a
-
SHA256
8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814
-
SHA512
028d198574399ef68b5e9e41faa979f546ef1250f8f13e91901e37270e5783ded3542605db15b28de9f95b5c88cd4ff28170d6c7be920b33b7b6df2caeb03940
-
SSDEEP
24576:sY2gUfVH5XlVYzagW4/3rn0Y5zmzRf1P2MVMl:DENH5X3ngbrnL5yzpVM
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 2652 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 2764 svchost.com 2676 8FFA3A~1.EXE 2788 svchost.com 2696 8FFA3A~1.EXE 2864 svchost.com 1708 8FFA3A~1.EXE 2684 svchost.com 2648 8FFA3A~1.EXE 2220 svchost.com 1136 8FFA3A~1.EXE 548 svchost.com 2804 8FFA3A~1.EXE 1044 svchost.com 1316 8FFA3A~1.EXE 1760 svchost.com 2196 8FFA3A~1.EXE 444 svchost.com 316 8FFA3A~1.EXE 308 svchost.com 2136 8FFA3A~1.EXE 284 svchost.com 1528 8FFA3A~1.EXE 1508 svchost.com 760 8FFA3A~1.EXE 900 svchost.com 1628 8FFA3A~1.EXE 1640 svchost.com 1692 8FFA3A~1.EXE 2492 svchost.com 2888 8FFA3A~1.EXE 1152 svchost.com 2840 8FFA3A~1.EXE 2832 svchost.com 2120 8FFA3A~1.EXE 2828 svchost.com 2624 8FFA3A~1.EXE 2836 svchost.com 644 8FFA3A~1.EXE 1996 svchost.com 2908 8FFA3A~1.EXE 820 svchost.com 1984 8FFA3A~1.EXE 2904 svchost.com 548 8FFA3A~1.EXE 2004 svchost.com 1436 8FFA3A~1.EXE 1332 svchost.com 2928 8FFA3A~1.EXE 620 svchost.com 2960 8FFA3A~1.EXE 2968 svchost.com 2088 8FFA3A~1.EXE 916 svchost.com 1620 8FFA3A~1.EXE 1272 svchost.com 2976 8FFA3A~1.EXE 1080 svchost.com 1664 8FFA3A~1.EXE 908 svchost.com 1732 8FFA3A~1.EXE 2076 svchost.com 1536 8FFA3A~1.EXE 1752 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 2364 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 2364 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 2764 svchost.com 2764 svchost.com 2788 svchost.com 2788 svchost.com 2864 svchost.com 2864 svchost.com 2684 svchost.com 2684 svchost.com 2220 svchost.com 2220 svchost.com 548 svchost.com 548 svchost.com 1044 svchost.com 1044 svchost.com 1760 svchost.com 1760 svchost.com 2652 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 2364 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 444 svchost.com 444 svchost.com 2364 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 308 svchost.com 308 svchost.com 2364 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 284 svchost.com 284 svchost.com 1508 svchost.com 1508 svchost.com 2652 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 900 svchost.com 900 svchost.com 2652 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 1640 svchost.com 1640 svchost.com 2492 svchost.com 2492 svchost.com 1152 svchost.com 1152 svchost.com 2832 svchost.com 2832 svchost.com 2828 svchost.com 2828 svchost.com 2836 svchost.com 2836 svchost.com 1996 svchost.com 1996 svchost.com 820 svchost.com 820 svchost.com 2904 svchost.com 2904 svchost.com 2004 svchost.com 2004 svchost.com 1332 svchost.com 1332 svchost.com 620 svchost.com 620 svchost.com 2968 svchost.com 2968 svchost.com 916 svchost.com 916 svchost.com 1272 svchost.com 1272 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2652 2364 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 31 PID 2364 wrote to memory of 2652 2364 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 31 PID 2364 wrote to memory of 2652 2364 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 31 PID 2364 wrote to memory of 2652 2364 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 31 PID 2652 wrote to memory of 2764 2652 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 32 PID 2652 wrote to memory of 2764 2652 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 32 PID 2652 wrote to memory of 2764 2652 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 32 PID 2652 wrote to memory of 2764 2652 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 32 PID 2764 wrote to memory of 2676 2764 svchost.com 33 PID 2764 wrote to memory of 2676 2764 svchost.com 33 PID 2764 wrote to memory of 2676 2764 svchost.com 33 PID 2764 wrote to memory of 2676 2764 svchost.com 33 PID 2676 wrote to memory of 2788 2676 8FFA3A~1.EXE 34 PID 2676 wrote to memory of 2788 2676 8FFA3A~1.EXE 34 PID 2676 wrote to memory of 2788 2676 8FFA3A~1.EXE 34 PID 2676 wrote to memory of 2788 2676 8FFA3A~1.EXE 34 PID 2788 wrote to memory of 2696 2788 svchost.com 35 PID 2788 wrote to memory of 2696 2788 svchost.com 35 PID 2788 wrote to memory of 2696 2788 svchost.com 35 PID 2788 wrote to memory of 2696 2788 svchost.com 35 PID 2696 wrote to memory of 2864 2696 8FFA3A~1.EXE 36 PID 2696 wrote to memory of 2864 2696 8FFA3A~1.EXE 36 PID 2696 wrote to memory of 2864 2696 8FFA3A~1.EXE 36 PID 2696 wrote to memory of 2864 2696 8FFA3A~1.EXE 36 PID 2864 wrote to memory of 1708 2864 svchost.com 37 PID 2864 wrote to memory of 1708 2864 svchost.com 37 PID 2864 wrote to memory of 1708 2864 svchost.com 37 PID 2864 wrote to memory of 1708 2864 svchost.com 37 PID 1708 wrote to memory of 2684 1708 8FFA3A~1.EXE 116 PID 1708 wrote to memory of 2684 1708 8FFA3A~1.EXE 116 PID 1708 wrote to memory of 2684 1708 8FFA3A~1.EXE 116 PID 1708 wrote to memory of 2684 1708 8FFA3A~1.EXE 116 PID 2684 wrote to memory of 2648 2684 svchost.com 39 PID 2684 wrote to memory of 2648 2684 svchost.com 39 PID 2684 wrote to memory of 2648 2684 svchost.com 39 PID 2684 wrote to memory of 2648 2684 svchost.com 39 PID 2648 wrote to memory of 2220 2648 8FFA3A~1.EXE 40 PID 2648 wrote to memory of 2220 2648 8FFA3A~1.EXE 40 PID 2648 wrote to memory of 2220 2648 8FFA3A~1.EXE 40 PID 2648 wrote to memory of 2220 2648 8FFA3A~1.EXE 40 PID 2220 wrote to memory of 1136 2220 svchost.com 41 PID 2220 wrote to memory of 1136 2220 svchost.com 41 PID 2220 wrote to memory of 1136 2220 svchost.com 41 PID 2220 wrote to memory of 1136 2220 svchost.com 41 PID 1136 wrote to memory of 548 1136 8FFA3A~1.EXE 75 PID 1136 wrote to memory of 548 1136 8FFA3A~1.EXE 75 PID 1136 wrote to memory of 548 1136 8FFA3A~1.EXE 75 PID 1136 wrote to memory of 548 1136 8FFA3A~1.EXE 75 PID 548 wrote to memory of 2804 548 svchost.com 123 PID 548 wrote to memory of 2804 548 svchost.com 123 PID 548 wrote to memory of 2804 548 svchost.com 123 PID 548 wrote to memory of 2804 548 svchost.com 123 PID 2804 wrote to memory of 1044 2804 8FFA3A~1.EXE 44 PID 2804 wrote to memory of 1044 2804 8FFA3A~1.EXE 44 PID 2804 wrote to memory of 1044 2804 8FFA3A~1.EXE 44 PID 2804 wrote to memory of 1044 2804 8FFA3A~1.EXE 44 PID 1044 wrote to memory of 1316 1044 svchost.com 45 PID 1044 wrote to memory of 1316 1044 svchost.com 45 PID 1044 wrote to memory of 1316 1044 svchost.com 45 PID 1044 wrote to memory of 1316 1044 svchost.com 45 PID 1316 wrote to memory of 1760 1316 8FFA3A~1.EXE 46 PID 1316 wrote to memory of 1760 1316 8FFA3A~1.EXE 46 PID 1316 wrote to memory of 1760 1316 8FFA3A~1.EXE 46 PID 1316 wrote to memory of 1760 1316 8FFA3A~1.EXE 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe"C:\Users\Admin\AppData\Local\Temp\8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE8⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE18⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE20⤵
- Executes dropped EXE
PID:316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE22⤵
- Executes dropped EXE
PID:2136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:284 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE24⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE26⤵
- Executes dropped EXE
PID:760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE28⤵
- Executes dropped EXE
PID:1628 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE30⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE32⤵
- Executes dropped EXE
PID:2888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE34⤵
- Executes dropped EXE
PID:2840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE38⤵
- Executes dropped EXE
PID:2624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE40⤵
- Executes dropped EXE
PID:644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE42⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE44⤵
- Executes dropped EXE
PID:1984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE46⤵
- Executes dropped EXE
PID:548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE48⤵
- Executes dropped EXE
PID:1436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE52⤵
- Executes dropped EXE
PID:2960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE54⤵
- Executes dropped EXE
PID:2088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:916 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"59⤵
- Executes dropped EXE
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE60⤵
- Executes dropped EXE
PID:1664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"61⤵
- Executes dropped EXE
PID:908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE62⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE64⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE66⤵
- Drops file in Windows directory
PID:740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE68⤵
- Drops file in Windows directory
PID:612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"69⤵PID:1492
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE70⤵PID:1644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"71⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE72⤵
- System Location Discovery: System Language Discovery
PID:900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"73⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE74⤵PID:1712
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"75⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE76⤵PID:2680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"77⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE78⤵
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"79⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE80⤵PID:2852
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"81⤵
- System Location Discovery: System Language Discovery
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE82⤵PID:2248
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"83⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE84⤵PID:2588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"85⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE86⤵PID:2568
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"87⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE88⤵PID:1512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"89⤵
- Drops file in Windows directory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE90⤵PID:2760
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"91⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE92⤵PID:2376
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"93⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE94⤵PID:2804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"95⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE96⤵
- System Location Discovery: System Language Discovery
PID:2952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"97⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE98⤵PID:1944
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"99⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE100⤵PID:2348
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"101⤵
- Drops file in Windows directory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE102⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"103⤵PID:1840
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE104⤵PID:1860
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"105⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE106⤵PID:2036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"107⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE108⤵
- System Location Discovery: System Language Discovery
PID:676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"109⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE110⤵PID:1320
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE112⤵PID:1680
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"113⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE114⤵PID:1052
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"115⤵
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE116⤵PID:2160
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"117⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE118⤵PID:1496
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"119⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE120⤵PID:1580
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"121⤵PID:2500
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE122⤵
- Drops file in Windows directory
PID:2208
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-