Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25/11/2024, 06:09
Static task
static1
Behavioral task
behavioral1
Sample
fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe
Resource
win10v2004-20241007-en
General
-
Target
fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe
-
Size
383KB
-
MD5
22f70db1f27b3553a4942d1b3cbe7275
-
SHA1
3c6aba77ef2c4f9355a66154cacc8ea514c16c06
-
SHA256
fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec
-
SHA512
3adb4c03d1dd124f6de7716490733df250397dd59d950d777ca300e8424dcb4d7cecba71e585c1d72780ed9446d0a769bcfd741bfc1052086d9d43e61fc5ba09
-
SSDEEP
3072:zr8WDrCjXrtbl44nwb+E/UeH+QyJen3nt3fJaiakiO8sd8rKzXetLYruD5fDeFru:PujXM4nntUNfJzeOxXeyro5uu
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 2752 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 2632 svchost.com 2708 FD662C~1.EXE 2544 svchost.com 2272 FD662C~1.EXE 1048 svchost.com 648 FD662C~1.EXE 3008 svchost.com 2060 FD662C~1.EXE 2064 svchost.com 1976 FD662C~1.EXE 848 svchost.com 2860 FD662C~1.EXE 3004 svchost.com 308 FD662C~1.EXE 1012 svchost.com 828 FD662C~1.EXE 624 svchost.com 2504 FD662C~1.EXE 844 svchost.com 1464 FD662C~1.EXE 1968 svchost.com 632 FD662C~1.EXE 1944 svchost.com 796 FD662C~1.EXE 2192 svchost.com 2388 FD662C~1.EXE 1644 svchost.com 2772 FD662C~1.EXE 2960 svchost.com 1856 FD662C~1.EXE 2616 svchost.com 2596 FD662C~1.EXE 2904 svchost.com 1700 FD662C~1.EXE 2176 svchost.com 1844 FD662C~1.EXE 1964 svchost.com 2280 FD662C~1.EXE 3000 svchost.com 528 FD662C~1.EXE 2644 svchost.com 2760 FD662C~1.EXE 472 svchost.com 344 FD662C~1.EXE 1972 svchost.com 1248 FD662C~1.EXE 2512 svchost.com 3004 FD662C~1.EXE 2112 svchost.com 1704 FD662C~1.EXE 2056 svchost.com 2420 FD662C~1.EXE 1012 svchost.com 1960 FD662C~1.EXE 2480 svchost.com 2348 FD662C~1.EXE 2628 svchost.com 2484 FD662C~1.EXE 844 svchost.com 1984 FD662C~1.EXE 1472 svchost.com 1676 FD662C~1.EXE 2260 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 2744 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 2744 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 2632 svchost.com 2632 svchost.com 2544 svchost.com 2544 svchost.com 1048 svchost.com 1048 svchost.com 3008 svchost.com 3008 svchost.com 2064 svchost.com 2064 svchost.com 848 svchost.com 848 svchost.com 2752 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 2744 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 2752 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 3004 svchost.com 3004 svchost.com 1012 svchost.com 1012 svchost.com 2752 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 2752 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 624 svchost.com 624 svchost.com 844 svchost.com 844 svchost.com 1968 svchost.com 1968 svchost.com 1944 svchost.com 1944 svchost.com 2192 svchost.com 2192 svchost.com 2752 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 1644 svchost.com 1644 svchost.com 2960 svchost.com 2960 svchost.com 2616 svchost.com 2616 svchost.com 2904 svchost.com 2904 svchost.com 2176 svchost.com 2176 svchost.com 1964 svchost.com 1964 svchost.com 3000 svchost.com 3000 svchost.com 2644 svchost.com 2644 svchost.com 472 svchost.com 472 svchost.com 1972 svchost.com 1972 svchost.com 2512 svchost.com 2512 svchost.com 2112 svchost.com 2112 svchost.com 2056 svchost.com 2056 svchost.com 1012 svchost.com 1012 svchost.com 2480 svchost.com 2480 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com FD662C~1.EXE File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FD662C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FD662C~1.EXE -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2752 2744 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 31 PID 2744 wrote to memory of 2752 2744 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 31 PID 2744 wrote to memory of 2752 2744 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 31 PID 2744 wrote to memory of 2752 2744 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 31 PID 2752 wrote to memory of 2632 2752 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 32 PID 2752 wrote to memory of 2632 2752 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 32 PID 2752 wrote to memory of 2632 2752 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 32 PID 2752 wrote to memory of 2632 2752 fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe 32 PID 2632 wrote to memory of 2708 2632 svchost.com 33 PID 2632 wrote to memory of 2708 2632 svchost.com 33 PID 2632 wrote to memory of 2708 2632 svchost.com 33 PID 2632 wrote to memory of 2708 2632 svchost.com 33 PID 2708 wrote to memory of 2544 2708 FD662C~1.EXE 34 PID 2708 wrote to memory of 2544 2708 FD662C~1.EXE 34 PID 2708 wrote to memory of 2544 2708 FD662C~1.EXE 34 PID 2708 wrote to memory of 2544 2708 FD662C~1.EXE 34 PID 2544 wrote to memory of 2272 2544 svchost.com 35 PID 2544 wrote to memory of 2272 2544 svchost.com 35 PID 2544 wrote to memory of 2272 2544 svchost.com 35 PID 2544 wrote to memory of 2272 2544 svchost.com 35 PID 2272 wrote to memory of 1048 2272 FD662C~1.EXE 36 PID 2272 wrote to memory of 1048 2272 FD662C~1.EXE 36 PID 2272 wrote to memory of 1048 2272 FD662C~1.EXE 36 PID 2272 wrote to memory of 1048 2272 FD662C~1.EXE 36 PID 1048 wrote to memory of 648 1048 svchost.com 37 PID 1048 wrote to memory of 648 1048 svchost.com 37 PID 1048 wrote to memory of 648 1048 svchost.com 37 PID 1048 wrote to memory of 648 1048 svchost.com 37 PID 648 wrote to memory of 3008 648 FD662C~1.EXE 38 PID 648 wrote to memory of 3008 648 FD662C~1.EXE 38 PID 648 wrote to memory of 3008 648 FD662C~1.EXE 38 PID 648 wrote to memory of 3008 648 FD662C~1.EXE 38 PID 3008 wrote to memory of 2060 3008 svchost.com 39 PID 3008 wrote to memory of 2060 3008 svchost.com 39 PID 3008 wrote to memory of 2060 3008 svchost.com 39 PID 3008 wrote to memory of 2060 3008 svchost.com 39 PID 2060 wrote to memory of 2064 2060 FD662C~1.EXE 40 PID 2060 wrote to memory of 2064 2060 FD662C~1.EXE 40 PID 2060 wrote to memory of 2064 2060 FD662C~1.EXE 40 PID 2060 wrote to memory of 2064 2060 FD662C~1.EXE 40 PID 2064 wrote to memory of 1976 2064 svchost.com 41 PID 2064 wrote to memory of 1976 2064 svchost.com 41 PID 2064 wrote to memory of 1976 2064 svchost.com 41 PID 2064 wrote to memory of 1976 2064 svchost.com 41 PID 1976 wrote to memory of 848 1976 FD662C~1.EXE 42 PID 1976 wrote to memory of 848 1976 FD662C~1.EXE 42 PID 1976 wrote to memory of 848 1976 FD662C~1.EXE 42 PID 1976 wrote to memory of 848 1976 FD662C~1.EXE 42 PID 848 wrote to memory of 2860 848 svchost.com 43 PID 848 wrote to memory of 2860 848 svchost.com 43 PID 848 wrote to memory of 2860 848 svchost.com 43 PID 848 wrote to memory of 2860 848 svchost.com 43 PID 2860 wrote to memory of 3004 2860 FD662C~1.EXE 79 PID 2860 wrote to memory of 3004 2860 FD662C~1.EXE 79 PID 2860 wrote to memory of 3004 2860 FD662C~1.EXE 79 PID 2860 wrote to memory of 3004 2860 FD662C~1.EXE 79 PID 3004 wrote to memory of 308 3004 svchost.com 45 PID 3004 wrote to memory of 308 3004 svchost.com 45 PID 3004 wrote to memory of 308 3004 svchost.com 45 PID 3004 wrote to memory of 308 3004 svchost.com 45 PID 308 wrote to memory of 1012 308 FD662C~1.EXE 84 PID 308 wrote to memory of 1012 308 FD662C~1.EXE 84 PID 308 wrote to memory of 1012 308 FD662C~1.EXE 84 PID 308 wrote to memory of 1012 308 FD662C~1.EXE 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe"C:\Users\Admin\AppData\Local\Temp\fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\fd662cb0b8064f5d34bf8b319cc7d8eedba7db34d1e133b9ecc9d999acac1bec.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE18⤵
- Executes dropped EXE
PID:828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:624 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE20⤵
- Executes dropped EXE
PID:2504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE22⤵
- Executes dropped EXE
PID:1464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE26⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE28⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE30⤵
- Executes dropped EXE
PID:2772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE32⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE34⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE36⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE38⤵
- Executes dropped EXE
PID:1844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE42⤵
- Executes dropped EXE
PID:528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE44⤵
- Executes dropped EXE
PID:2760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE46⤵
- Executes dropped EXE
PID:344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE48⤵
- Executes dropped EXE
PID:1248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE50⤵
- Executes dropped EXE
PID:3004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE52⤵
- Executes dropped EXE
PID:1704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE56⤵
- Executes dropped EXE
PID:1960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE58⤵
- Executes dropped EXE
PID:2348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"59⤵
- Executes dropped EXE
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE60⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"61⤵
- Executes dropped EXE
PID:844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE62⤵
- Executes dropped EXE
PID:1984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE64⤵
- Executes dropped EXE
PID:1676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"65⤵
- Executes dropped EXE
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE66⤵PID:1944
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"67⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE68⤵
- Drops file in Windows directory
PID:2136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"69⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE70⤵
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"71⤵
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE72⤵
- Drops file in Windows directory
PID:2808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE74⤵PID:2812
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"75⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE76⤵
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"77⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE78⤵PID:2620
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"79⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE80⤵PID:1408
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"81⤵
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE82⤵
- System Location Discovery: System Language Discovery
PID:648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"83⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE84⤵
- Drops file in Windows directory
PID:2928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"85⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE86⤵PID:2912
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"87⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE88⤵PID:2876
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"89⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE90⤵
- System Location Discovery: System Language Discovery
PID:848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"91⤵
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE92⤵PID:1784
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"93⤵
- Drops file in Windows directory
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE94⤵
- Drops file in Windows directory
PID:2376 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"95⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE96⤵PID:884
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"97⤵PID:2220
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE98⤵PID:1112
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"99⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE100⤵
- System Location Discovery: System Language Discovery
PID:1852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"101⤵PID:988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE102⤵PID:2492
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"103⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE104⤵PID:1228
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"105⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE106⤵PID:3032
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"107⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE108⤵
- Drops file in Windows directory
PID:1212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"109⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE110⤵PID:1000
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"111⤵
- Drops file in Windows directory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE112⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"113⤵PID:2136
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE114⤵
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"115⤵PID:1536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE116⤵PID:1740
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"117⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE118⤵PID:2976
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"119⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE120⤵PID:2156
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE"121⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FD662C~1.EXE122⤵PID:1556
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-