Analysis
-
max time kernel
6s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 21:02
Behavioral task
behavioral1
Sample
d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe
Resource
win10v2004-20241007-en
General
-
Target
d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe
-
Size
719KB
-
MD5
d5fa75ad1ce07b13a32b8b5acd7c29f0
-
SHA1
e92121b871b9bc85fdc2d871909a33bc02e46420
-
SHA256
d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bc
-
SHA512
3dacc8ac1dc09298e211799f276487e72a4acf49b3781db41f0485d5451f06daf1ad9da2a55c8e421ce7a1c863bd33d46f31eec96ef2f720e68ee9b6858b6ebb
-
SSDEEP
6144:k972+Mq9zntr0sfGxhfLyYB4AYB4ruJqLOuDUm6QglV5MxqZ1zSAzSnUE4kwIz+Y:g2FqPz4UmTAV5MczzSAzStZz+p1k5
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000b000000023b90-4.dat family_neshta behavioral2/files/0x000a000000023b94-10.dat family_neshta behavioral2/memory/1880-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1140-17-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3252-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5088-33-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/632-34-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1840-38-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5084-57-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1736-46-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3140-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3232-62-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/756-70-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3268-81-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/640-82-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4232-93-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1764-94-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1820-98-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/620-106-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3460-117-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3852-118-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4108-122-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3604-130-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4964-131-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3980-135-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/396-143-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2244-147-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1860-155-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2500-166-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4804-171-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2004-170-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2120-179-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1544-189-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1952-191-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1744-193-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2968-199-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/232-201-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4876-207-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4796-209-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1260-215-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/224-222-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3252-223-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4228-229-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/632-231-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3176-233-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/384-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1648-247-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5016-245-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3116-248-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4512-250-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1496-256-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4088-258-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3392-264-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2756-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/976-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4928-274-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2520-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4424-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/228-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/432-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4708-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4300-298-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1720-304-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1416-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation D04B73~1.EXE -
Executes dropped EXE 5 IoCs
pid Process 5016 d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe 1140 svchost.com 1880 D04B73~1.EXE 3252 svchost.com 5088 D04B73~1.EXE -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys D04B73~1.EXE File opened for modification C:\Windows\svchost.com D04B73~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe File opened for modification C:\Windows\svchost.com d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D04B73~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings D04B73~1.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3604 wrote to memory of 5016 3604 d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe 84 PID 3604 wrote to memory of 5016 3604 d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe 84 PID 3604 wrote to memory of 5016 3604 d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe 84 PID 5016 wrote to memory of 1140 5016 d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe 488 PID 5016 wrote to memory of 1140 5016 d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe 488 PID 5016 wrote to memory of 1140 5016 d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe 488 PID 1140 wrote to memory of 1880 1140 svchost.com 86 PID 1140 wrote to memory of 1880 1140 svchost.com 86 PID 1140 wrote to memory of 1880 1140 svchost.com 86 PID 1880 wrote to memory of 3252 1880 D04B73~1.EXE 515 PID 1880 wrote to memory of 3252 1880 D04B73~1.EXE 515 PID 1880 wrote to memory of 3252 1880 D04B73~1.EXE 515 PID 3252 wrote to memory of 5088 3252 svchost.com 164 PID 3252 wrote to memory of 5088 3252 svchost.com 164 PID 3252 wrote to memory of 5088 3252 svchost.com 164
Processes
-
C:\Users\Admin\AppData\Local\Temp\d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe"C:\Users\Admin\AppData\Local\Temp\d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\d04b73d07b61680bda170eb86a5a65ad62e0e3b122ff577251449e5d58bb19bcN.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE6⤵
- Executes dropped EXE
PID:5088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"7⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE8⤵PID:1840
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"9⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE10⤵PID:5084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"11⤵PID:3140
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE12⤵PID:3232
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"13⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE14⤵PID:3268
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"15⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE16⤵PID:4232
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"17⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE18⤵PID:1820
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"19⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE20⤵PID:3460
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"21⤵PID:3852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE22⤵PID:4108
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"23⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE24⤵PID:3980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"25⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE26⤵PID:2244
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"27⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE28⤵PID:2500
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"29⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE30⤵PID:4804
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"31⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE32⤵PID:1544
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"33⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE34⤵PID:1744
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"35⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE36⤵PID:232
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"37⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE38⤵PID:4796
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"39⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE40⤵PID:224
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"41⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE42⤵PID:4228
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"43⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE44⤵PID:3176
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"45⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE46⤵PID:1648
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"47⤵PID:3116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE48⤵PID:4512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"49⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE50⤵PID:4088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"51⤵PID:3392
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE52⤵PID:2756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"53⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE54⤵PID:4928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"55⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE56⤵PID:4424
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"57⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE58⤵PID:432
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"59⤵PID:4708
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE60⤵PID:4300
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"61⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE62⤵PID:1416
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"63⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE64⤵PID:336
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"65⤵PID:3216
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE66⤵PID:5068
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"67⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE68⤵PID:3248
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"69⤵PID:4156
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE70⤵PID:3760
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"71⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE72⤵PID:4456
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"73⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE74⤵PID:2092
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"75⤵PID:3304
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE76⤵PID:4508
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"77⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE78⤵PID:5060
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"79⤵PID:1260
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE80⤵PID:1584
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"81⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE82⤵PID:5088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"83⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE84⤵PID:1840
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"85⤵PID:3612
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE86⤵PID:2728
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"87⤵PID:5012
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE88⤵PID:2988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"89⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE90⤵PID:4968
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"91⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE92⤵PID:4216
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"93⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE94⤵PID:3068
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"95⤵PID:1828
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE96⤵PID:3756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"97⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE98⤵PID:2096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"99⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE100⤵PID:336
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"101⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE102⤵PID:404
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"103⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE104⤵PID:1740
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"105⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE106⤵PID:3940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"107⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE108⤵PID:2092
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"109⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE110⤵PID:1568
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"111⤵PID:64
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE112⤵PID:4908
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"113⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE114⤵PID:536
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"115⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE116⤵PID:1224
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"117⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE118⤵PID:4304
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"119⤵PID:4748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE120⤵PID:2872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE"121⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D04B73~1.EXE122⤵PID:3284
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-