Analysis
-
max time kernel
30s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 04:50
Behavioral task
behavioral1
Sample
d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe
Resource
win10v2004-20241007-en
General
-
Target
d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe
-
Size
2.8MB
-
MD5
b7e569219db434b23bb91d26d8789880
-
SHA1
3e46f441aa57de2707e1fb0befbef374f3a2f4f7
-
SHA256
d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2b
-
SHA512
953e37f82e6125f8fca2e134996d8cfcd3d3b2ddff2cb9549782fbba863ac7800b509cc27e5c21480c99db985db2946df9130315b2eceb7734e2c6d7e184dc04
-
SSDEEP
49152:tu/L1BdnH/DzQhVavU6MAkztpCv/qiFJ8gTDkv3uQ1ip1SZGwTPRBh5GTfLde8+w:+1xzM13yAB8LktOTfJsv6tWKFdu9C
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral1/files/0x000f000000016d64-2.dat family_neshta behavioral1/files/0x00080000000170f8-15.dat family_neshta behavioral1/files/0x0001000000010314-19.dat family_neshta behavioral1/files/0x0001000000010312-18.dat family_neshta behavioral1/files/0x0005000000010351-17.dat family_neshta behavioral1/files/0x0002000000010484-16.dat family_neshta behavioral1/memory/2876-31-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2888-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2780-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2748-45-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2544-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2720-59-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2224-72-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1724-71-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2824-86-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2764-85-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1160-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2552-99-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1012-113-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3016-114-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2320-128-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2384-127-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x000100000000f7d8-138.dat family_neshta behavioral1/memory/2188-157-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1920-158-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2140-180-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2112-179-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/824-178-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2424-176-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1304-196-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1792-197-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1780-206-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1696-205-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1008-221-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/304-220-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2052-228-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1048-229-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/876-253-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2712-254-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2056-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/924-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2732-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2440-281-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2724-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1084-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2896-305-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2840-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2396-313-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2788-314-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2348-321-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2224-322-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2220-329-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1332-330-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2160-338-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2612-337-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2308-345-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3068-346-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2552-354-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1648-353-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/852-362-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2212-361-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2040-370-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2144-369-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2080-378-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 2140 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 2876 svchost.com 2888 D6A71B~1.EXE 2748 svchost.com 2780 D6A71B~1.EXE 2720 svchost.com 2544 D6A71B~1.EXE 2224 svchost.com 1724 D6A71B~1.EXE 2824 svchost.com 2764 D6A71B~1.EXE 1160 svchost.com 2552 D6A71B~1.EXE 3016 svchost.com 1012 D6A71B~1.EXE 2384 svchost.com 2320 D6A71B~1.EXE 1920 svchost.com 2188 D6A71B~1.EXE 2112 svchost.com 824 D6A71B~1.EXE 1792 svchost.com 1304 D6A71B~1.EXE 1780 svchost.com 1696 D6A71B~1.EXE 1008 svchost.com 304 D6A71B~1.EXE 1048 svchost.com 2052 D6A71B~1.EXE 2712 svchost.com 876 D6A71B~1.EXE 924 svchost.com 2056 D6A71B~1.EXE 2732 svchost.com 2440 D6A71B~1.EXE 1084 svchost.com 2724 D6A71B~1.EXE 2840 svchost.com 2896 D6A71B~1.EXE 2788 svchost.com 2396 D6A71B~1.EXE 2224 svchost.com 2348 D6A71B~1.EXE 1332 svchost.com 2220 D6A71B~1.EXE 2160 svchost.com 2612 D6A71B~1.EXE 3068 svchost.com 2308 D6A71B~1.EXE 2552 svchost.com 1648 D6A71B~1.EXE 852 svchost.com 2212 D6A71B~1.EXE 2040 svchost.com 2144 D6A71B~1.EXE 2080 svchost.com 2108 D6A71B~1.EXE 1536 svchost.com 572 D6A71B~1.EXE 1564 svchost.com 2152 D6A71B~1.EXE 1560 svchost.com 948 D6A71B~1.EXE 1804 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 2424 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 2424 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 2876 svchost.com 2876 svchost.com 2748 svchost.com 2748 svchost.com 2720 svchost.com 2720 svchost.com 2224 svchost.com 2224 svchost.com 2824 svchost.com 2824 svchost.com 1160 svchost.com 1160 svchost.com 3016 svchost.com 3016 svchost.com 2384 svchost.com 2384 svchost.com 1920 svchost.com 1920 svchost.com 2140 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 2424 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 2424 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 2424 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 2424 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 2112 svchost.com 2112 svchost.com 1792 svchost.com 1792 svchost.com 1780 svchost.com 1780 svchost.com 1008 svchost.com 1008 svchost.com 1048 svchost.com 1048 svchost.com 2712 svchost.com 2712 svchost.com 2424 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 2424 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 924 svchost.com 924 svchost.com 2424 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 2732 svchost.com 2732 svchost.com 1084 svchost.com 1084 svchost.com 2840 svchost.com 2840 svchost.com 2788 svchost.com 2788 svchost.com 2224 svchost.com 2224 svchost.com 1332 svchost.com 1332 svchost.com 2160 svchost.com 2160 svchost.com 3068 svchost.com 3068 svchost.com 2552 svchost.com 2552 svchost.com 852 svchost.com 852 svchost.com 2040 svchost.com 2040 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com D6A71B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys D6A71B~1.EXE File opened for modification C:\Windows\directx.sys D6A71B~1.EXE File opened for modification C:\Windows\svchost.com D6A71B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys D6A71B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys D6A71B~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com D6A71B~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com D6A71B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com D6A71B~1.EXE File opened for modification C:\Windows\directx.sys D6A71B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com D6A71B~1.EXE File opened for modification C:\Windows\svchost.com D6A71B~1.EXE File opened for modification C:\Windows\directx.sys D6A71B~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com D6A71B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys D6A71B~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys D6A71B~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys D6A71B~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys D6A71B~1.EXE File opened for modification C:\Windows\svchost.com D6A71B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com D6A71B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys D6A71B~1.EXE File opened for modification C:\Windows\directx.sys D6A71B~1.EXE File opened for modification C:\Windows\svchost.com D6A71B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys D6A71B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D6A71B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2140 2424 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 29 PID 2424 wrote to memory of 2140 2424 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 29 PID 2424 wrote to memory of 2140 2424 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 29 PID 2424 wrote to memory of 2140 2424 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 29 PID 2140 wrote to memory of 2876 2140 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 30 PID 2140 wrote to memory of 2876 2140 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 30 PID 2140 wrote to memory of 2876 2140 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 30 PID 2140 wrote to memory of 2876 2140 d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe 30 PID 2876 wrote to memory of 2888 2876 svchost.com 31 PID 2876 wrote to memory of 2888 2876 svchost.com 31 PID 2876 wrote to memory of 2888 2876 svchost.com 31 PID 2876 wrote to memory of 2888 2876 svchost.com 31 PID 2888 wrote to memory of 2748 2888 D6A71B~1.EXE 32 PID 2888 wrote to memory of 2748 2888 D6A71B~1.EXE 32 PID 2888 wrote to memory of 2748 2888 D6A71B~1.EXE 32 PID 2888 wrote to memory of 2748 2888 D6A71B~1.EXE 32 PID 2748 wrote to memory of 2780 2748 svchost.com 33 PID 2748 wrote to memory of 2780 2748 svchost.com 33 PID 2748 wrote to memory of 2780 2748 svchost.com 33 PID 2748 wrote to memory of 2780 2748 svchost.com 33 PID 2780 wrote to memory of 2720 2780 D6A71B~1.EXE 34 PID 2780 wrote to memory of 2720 2780 D6A71B~1.EXE 34 PID 2780 wrote to memory of 2720 2780 D6A71B~1.EXE 34 PID 2780 wrote to memory of 2720 2780 D6A71B~1.EXE 34 PID 2720 wrote to memory of 2544 2720 svchost.com 35 PID 2720 wrote to memory of 2544 2720 svchost.com 35 PID 2720 wrote to memory of 2544 2720 svchost.com 35 PID 2720 wrote to memory of 2544 2720 svchost.com 35 PID 2544 wrote to memory of 2224 2544 D6A71B~1.EXE 70 PID 2544 wrote to memory of 2224 2544 D6A71B~1.EXE 70 PID 2544 wrote to memory of 2224 2544 D6A71B~1.EXE 70 PID 2544 wrote to memory of 2224 2544 D6A71B~1.EXE 70 PID 2224 wrote to memory of 1724 2224 svchost.com 37 PID 2224 wrote to memory of 1724 2224 svchost.com 37 PID 2224 wrote to memory of 1724 2224 svchost.com 37 PID 2224 wrote to memory of 1724 2224 svchost.com 37 PID 1724 wrote to memory of 2824 1724 D6A71B~1.EXE 38 PID 1724 wrote to memory of 2824 1724 D6A71B~1.EXE 38 PID 1724 wrote to memory of 2824 1724 D6A71B~1.EXE 38 PID 1724 wrote to memory of 2824 1724 D6A71B~1.EXE 38 PID 2824 wrote to memory of 2764 2824 svchost.com 39 PID 2824 wrote to memory of 2764 2824 svchost.com 39 PID 2824 wrote to memory of 2764 2824 svchost.com 39 PID 2824 wrote to memory of 2764 2824 svchost.com 39 PID 2764 wrote to memory of 1160 2764 D6A71B~1.EXE 40 PID 2764 wrote to memory of 1160 2764 D6A71B~1.EXE 40 PID 2764 wrote to memory of 1160 2764 D6A71B~1.EXE 40 PID 2764 wrote to memory of 1160 2764 D6A71B~1.EXE 40 PID 1160 wrote to memory of 2552 1160 svchost.com 78 PID 1160 wrote to memory of 2552 1160 svchost.com 78 PID 1160 wrote to memory of 2552 1160 svchost.com 78 PID 1160 wrote to memory of 2552 1160 svchost.com 78 PID 2552 wrote to memory of 3016 2552 D6A71B~1.EXE 42 PID 2552 wrote to memory of 3016 2552 D6A71B~1.EXE 42 PID 2552 wrote to memory of 3016 2552 D6A71B~1.EXE 42 PID 2552 wrote to memory of 3016 2552 D6A71B~1.EXE 42 PID 3016 wrote to memory of 1012 3016 svchost.com 43 PID 3016 wrote to memory of 1012 3016 svchost.com 43 PID 3016 wrote to memory of 1012 3016 svchost.com 43 PID 3016 wrote to memory of 1012 3016 svchost.com 43 PID 1012 wrote to memory of 2384 1012 D6A71B~1.EXE 44 PID 1012 wrote to memory of 2384 1012 D6A71B~1.EXE 44 PID 1012 wrote to memory of 2384 1012 D6A71B~1.EXE 44 PID 1012 wrote to memory of 2384 1012 D6A71B~1.EXE 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe"C:\Users\Admin\AppData\Local\Temp\d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\d6a71bae2967f1b58b1a552d0905d05e7ce84e3c189cf10911107ad573d70f2bN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE8⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2188 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE24⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE26⤵
- Executes dropped EXE
PID:1696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE28⤵
- Executes dropped EXE
PID:304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE30⤵
- Executes dropped EXE
PID:2052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE34⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE36⤵
- Executes dropped EXE
PID:2440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE42⤵
- Executes dropped EXE
PID:2396 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE44⤵
- Executes dropped EXE
PID:2348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE46⤵
- Executes dropped EXE
PID:2220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE50⤵
- Executes dropped EXE
PID:2308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE52⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE54⤵
- Executes dropped EXE
PID:2212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE56⤵
- Executes dropped EXE
PID:2144 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE58⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"59⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE60⤵
- Executes dropped EXE
PID:572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"61⤵
- Executes dropped EXE
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE62⤵
- Executes dropped EXE
PID:2152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"63⤵
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"65⤵
- Executes dropped EXE
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE66⤵PID:1532
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE68⤵
- System Location Discovery: System Language Discovery
PID:1360 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"69⤵PID:2196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE70⤵PID:1776
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"71⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE72⤵PID:1992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE74⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE76⤵PID:1480
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"77⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:740 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE78⤵
- Drops file in Windows directory
PID:548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"79⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE80⤵PID:2960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"81⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE82⤵PID:924
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"83⤵
- Drops file in Windows directory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE84⤵PID:2732
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"85⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE86⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"87⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE88⤵
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"89⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE90⤵
- Drops file in Windows directory
PID:1300 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"91⤵
- Drops file in Windows directory
PID:288 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE92⤵
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"93⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE94⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"95⤵
- Drops file in Windows directory
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE96⤵PID:2304
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"97⤵
- Drops file in Windows directory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE98⤵
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE100⤵PID:888
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"101⤵
- System Location Discovery: System Language Discovery
PID:844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE102⤵PID:1824
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"103⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE104⤵PID:2640
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"105⤵
- System Location Discovery: System Language Discovery
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE106⤵PID:1864
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"107⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE108⤵
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"109⤵
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE110⤵PID:1328
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"111⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE112⤵
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"113⤵
- System Location Discovery: System Language Discovery
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE114⤵PID:2700
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"115⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE116⤵PID:1732
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"117⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE118⤵
- Drops file in Windows directory
PID:1780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"119⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE120⤵
- Drops file in Windows directory
PID:1744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE"121⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D6A71B~1.EXE122⤵PID:2420
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-