Analysis
-
max time kernel
121s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-11-2024 05:58
Static task
static1
Behavioral task
behavioral1
Sample
fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe
Resource
win10v2004-20241007-en
General
-
Target
fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe
-
Size
383KB
-
MD5
22f70db1f27b3553a4942d1b3cbe7275
-
SHA1
3c6aba77ef2c4f9355a66154cacc8ea514c16c06
-
SHA256
fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec
-
SHA512
3adb4c03d1dd124f6de7716490733df250397dd59d950d777ca300e8424dcb4d7cecba71e585c1d72780ed9446d0a769bcfd741bfc1052086d9d43e61fc5ba09
-
SSDEEP
3072:zr8WDrCjXrtbl44nwb+E/UeH+QyJen3nt3fJaiakiO8sd8rKzXetLYruD5fDeFru:PujXM4nntUNfJzeOxXeyro5uu
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 1732 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 2880 svchost.com 2220 FD662C~1.EXE 2832 svchost.com 2720 FD662C~1.EXE 2756 svchost.com 2636 FD662C~1.EXE 2652 svchost.com 2668 FD662C~1.EXE 2640 svchost.com 1936 FD662C~1.EXE 748 svchost.com 1252 FD662C~1.EXE 1996 svchost.com 276 FD662C~1.EXE 1912 svchost.com 2932 FD662C~1.EXE 2180 svchost.com 2928 FD662C~1.EXE 1044 svchost.com 1924 FD662C~1.EXE 1268 svchost.com 1536 FD662C~1.EXE 3024 svchost.com 2428 FD662C~1.EXE 560 svchost.com 848 FD662C~1.EXE 2272 svchost.com 1556 FD662C~1.EXE 2516 svchost.com 2824 FD662C~1.EXE 2736 svchost.com 2876 FD662C~1.EXE 2728 svchost.com 2844 FD662C~1.EXE 2860 svchost.com 2648 FD662C~1.EXE 2672 svchost.com 2080 FD662C~1.EXE 2040 svchost.com 2716 FD662C~1.EXE 1424 svchost.com 936 FD662C~1.EXE 2664 svchost.com 1252 FD662C~1.EXE 2584 svchost.com 1300 FD662C~1.EXE 1188 svchost.com 2944 FD662C~1.EXE 2948 svchost.com 1592 FD662C~1.EXE 2056 svchost.com 2164 FD662C~1.EXE 2932 svchost.com 2424 FD662C~1.EXE 2936 svchost.com 2576 FD662C~1.EXE 596 svchost.com 2556 FD662C~1.EXE 3036 svchost.com 2784 FD662C~1.EXE 1532 svchost.com 2312 FD662C~1.EXE 1768 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 2396 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 2396 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 2880 svchost.com 2880 svchost.com 2832 svchost.com 2832 svchost.com 2756 svchost.com 2756 svchost.com 2652 svchost.com 2652 svchost.com 2640 svchost.com 2640 svchost.com 748 svchost.com 748 svchost.com 1732 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 2396 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 1996 svchost.com 1996 svchost.com 1732 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 1912 svchost.com 1912 svchost.com 2180 svchost.com 2180 svchost.com 2396 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 1044 svchost.com 1044 svchost.com 1268 svchost.com 1268 svchost.com 3024 svchost.com 3024 svchost.com 1732 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 560 svchost.com 560 svchost.com 2272 svchost.com 2272 svchost.com 2396 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 2516 svchost.com 2516 svchost.com 2736 svchost.com 2736 svchost.com 2728 svchost.com 2728 svchost.com 1732 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 2860 svchost.com 2860 svchost.com 2672 svchost.com 2672 svchost.com 2040 svchost.com 2040 svchost.com 1424 svchost.com 1424 svchost.com 2664 svchost.com 2664 svchost.com 2584 svchost.com 2584 svchost.com 1188 svchost.com 1188 svchost.com 2948 svchost.com 2948 svchost.com 2056 svchost.com 2056 svchost.com 2932 svchost.com 2932 svchost.com 2936 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2396 wrote to memory of 1732 2396 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 30 PID 2396 wrote to memory of 1732 2396 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 30 PID 2396 wrote to memory of 1732 2396 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 30 PID 2396 wrote to memory of 1732 2396 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 30 PID 1732 wrote to memory of 2880 1732 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 31 PID 1732 wrote to memory of 2880 1732 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 31 PID 1732 wrote to memory of 2880 1732 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 31 PID 1732 wrote to memory of 2880 1732 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 31 PID 2880 wrote to memory of 2220 2880 svchost.com 32 PID 2880 wrote to memory of 2220 2880 svchost.com 32 PID 2880 wrote to memory of 2220 2880 svchost.com 32 PID 2880 wrote to memory of 2220 2880 svchost.com 32 PID 2220 wrote to memory of 2832 2220 FD662C~1.EXE 33 PID 2220 wrote to memory of 2832 2220 FD662C~1.EXE 33 PID 2220 wrote to memory of 2832 2220 FD662C~1.EXE 33 PID 2220 wrote to memory of 2832 2220 FD662C~1.EXE 33 PID 2832 wrote to memory of 2720 2832 svchost.com 34 PID 2832 wrote to memory of 2720 2832 svchost.com 34 PID 2832 wrote to memory of 2720 2832 svchost.com 34 PID 2832 wrote to memory of 2720 2832 svchost.com 34 PID 2720 wrote to memory of 2756 2720 FD662C~1.EXE 35 PID 2720 wrote to memory of 2756 2720 FD662C~1.EXE 35 PID 2720 wrote to memory of 2756 2720 FD662C~1.EXE 35 PID 2720 wrote to memory of 2756 2720 FD662C~1.EXE 35 PID 2756 wrote to memory of 2636 2756 svchost.com 36 PID 2756 wrote to memory of 2636 2756 svchost.com 36 PID 2756 wrote to memory of 2636 2756 svchost.com 36 PID 2756 wrote to memory of 2636 2756 svchost.com 36 PID 2636 wrote to memory of 2652 2636 FD662C~1.EXE 37 PID 2636 wrote to memory of 2652 2636 FD662C~1.EXE 37 PID 2636 wrote to memory of 2652 2636 FD662C~1.EXE 37 PID 2636 wrote to memory of 2652 2636 FD662C~1.EXE 37 PID 2652 wrote to memory of 2668 2652 svchost.com 38 PID 2652 wrote to memory of 2668 2652 svchost.com 38 PID 2652 wrote to memory of 2668 2652 svchost.com 38 PID 2652 wrote to memory of 2668 2652 svchost.com 38 PID 2668 wrote to memory of 2640 2668 FD662C~1.EXE 39 PID 2668 wrote to memory of 2640 2668 FD662C~1.EXE 39 PID 2668 wrote to memory of 2640 2668 FD662C~1.EXE 39 PID 2668 wrote to memory of 2640 2668 FD662C~1.EXE 39 PID 2640 wrote to memory of 1936 2640 svchost.com 114 PID 2640 wrote to memory of 1936 2640 svchost.com 114 PID 2640 wrote to memory of 1936 2640 svchost.com 114 PID 2640 wrote to memory of 1936 2640 svchost.com 114 PID 1936 wrote to memory of 748 1936 FD662C~1.EXE 118 PID 1936 wrote to memory of 748 1936 FD662C~1.EXE 118 PID 1936 wrote to memory of 748 1936 FD662C~1.EXE 118 PID 1936 wrote to memory of 748 1936 FD662C~1.EXE 118 PID 748 wrote to memory of 1252 748 svchost.com 74 PID 748 wrote to memory of 1252 748 svchost.com 74 PID 748 wrote to memory of 1252 748 svchost.com 74 PID 748 wrote to memory of 1252 748 svchost.com 74 PID 1252 wrote to memory of 1996 1252 FD662C~1.EXE 43 PID 1252 wrote to memory of 1996 1252 FD662C~1.EXE 43 PID 1252 wrote to memory of 1996 1252 FD662C~1.EXE 43 PID 1252 wrote to memory of 1996 1252 FD662C~1.EXE 43 PID 1996 wrote to memory of 276 1996 svchost.com 44 PID 1996 wrote to memory of 276 1996 svchost.com 44 PID 1996 wrote to memory of 276 1996 svchost.com 44 PID 1996 wrote to memory of 276 1996 svchost.com 44 PID 276 wrote to memory of 1912 276 FD662C~1.EXE 45 PID 276 wrote to memory of 1912 276 FD662C~1.EXE 45 PID 276 wrote to memory of 1912 276 FD662C~1.EXE 45 PID 276 wrote to memory of 1912 276 FD662C~1.EXE 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe"C:\Users\Admin\AppData\Local\Temp\fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE20⤵
- Executes dropped EXE
PID:2928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE22⤵
- Executes dropped EXE
PID:1924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE24⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE26⤵
- Executes dropped EXE
PID:2428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE28⤵
- Executes dropped EXE
PID:848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE30⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE32⤵
- Executes dropped EXE
PID:2824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE34⤵
- Executes dropped EXE
PID:2876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE36⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE38⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE40⤵
- Executes dropped EXE
PID:2080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE42⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE44⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE46⤵
- Executes dropped EXE
PID:1252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE48⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE50⤵
- Executes dropped EXE
PID:2944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE52⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE54⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE56⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE58⤵
- Executes dropped EXE
PID:2576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"59⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE60⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"61⤵
- Executes dropped EXE
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE62⤵
- Executes dropped EXE
PID:2784 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"63⤵
- Executes dropped EXE
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE64⤵
- Executes dropped EXE
PID:2312 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE66⤵PID:1684
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"67⤵
- Drops file in Windows directory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE68⤵
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"69⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE70⤵PID:848
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"71⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE72⤵PID:2528
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"73⤵PID:2132
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE74⤵PID:2816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE76⤵
- Drops file in Windows directory
PID:2688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"77⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE78⤵PID:1964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"79⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE80⤵PID:2604
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"81⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE82⤵PID:2616
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"83⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE84⤵PID:2592
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"85⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE86⤵PID:1936
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"87⤵
- System Location Discovery: System Language Discovery
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE88⤵PID:264
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"89⤵PID:1308
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE90⤵PID:748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"91⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE92⤵PID:808
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"93⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE94⤵PID:2344
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"95⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE96⤵PID:2684
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"97⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE98⤵PID:2304
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"99⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE100⤵PID:732
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"101⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE102⤵PID:3068
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"103⤵
- Drops file in Windows directory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE104⤵PID:2368
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"105⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE106⤵PID:1772
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"107⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE108⤵
- System Location Discovery: System Language Discovery
PID:2452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"109⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE110⤵
- Drops file in Windows directory
PID:820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"111⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE112⤵PID:540
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"113⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE114⤵PID:1564
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"115⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE116⤵PID:2012
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"117⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE118⤵PID:1712
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"119⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE120⤵PID:2852
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"121⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE122⤵PID:3012
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-