Analysis
-
max time kernel
26s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
02-01-2025 07:27
Behavioral task
behavioral1
Sample
65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe
Resource
win10v2004-20241007-en
General
-
Target
65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe
-
Size
360KB
-
MD5
7ced1050d7e0ed0f9f44b1b261b93be0
-
SHA1
691430c1c8678bbbbf44a8be7237971911f5679f
-
SHA256
65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756a
-
SHA512
97fa4ed211885e4a8906712660d18603932712ff7bd5fe189c5b1564565a907861604ccf0558678e3617f254b4266a268caf3d4bcafcd4d17259a454ca4d0afb
-
SSDEEP
6144:k9ZWxpNzfEsKQo9PiF+/rMbe1/o1ZAOvK8ZJqOpiSHJpls4Yn7/n+qaWRSBVYAgN:7pNbEpQo9PRo1ZtvqOpxHJpls4Yn7/nQ
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral1/files/0x000f000000016d64-2.dat family_neshta behavioral1/files/0x00080000000170f8-15.dat family_neshta behavioral1/files/0x0002000000010484-16.dat family_neshta behavioral1/files/0x0001000000010314-19.dat family_neshta behavioral1/files/0x0001000000010312-18.dat family_neshta behavioral1/files/0x0005000000010351-17.dat family_neshta behavioral1/memory/2428-29-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2996-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2920-43-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2980-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2792-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2092-57-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1996-72-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2704-71-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/744-86-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2536-85-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3060-101-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2612-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2636-114-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1832-113-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/888-129-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1032-128-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2040-143-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2676-142-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1536-151-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2080-152-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/824-159-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/916-160-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2476-177-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/524-178-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1360-194-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2256-195-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/820-214-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2096-215-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1736-222-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/912-223-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/944-233-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2796-232-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2012-242-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2564-243-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1604-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2856-254-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2924-263-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2312-264-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2984-275-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2892-274-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2760-283-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2896-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1640-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2776-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2380-308-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1332-307-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2764-326-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/744-325-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2336-344-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2668-345-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/632-359-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2212-360-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2184-367-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3064-368-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2364-377-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2280-378-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2480-392-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2272-393-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 2140 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 2996 svchost.com 2428 65ECC7~1.EXE 2980 svchost.com 2920 65ECC7~1.EXE 2792 svchost.com 2092 65ECC7~1.EXE 2704 svchost.com 1996 65ECC7~1.EXE 744 svchost.com 2536 65ECC7~1.EXE 3060 svchost.com 2612 65ECC7~1.EXE 1832 svchost.com 2636 65ECC7~1.EXE 888 svchost.com 1032 65ECC7~1.EXE 2040 svchost.com 2676 65ECC7~1.EXE 2080 svchost.com 1536 65ECC7~1.EXE 916 svchost.com 824 65ECC7~1.EXE 524 svchost.com 2476 65ECC7~1.EXE 2256 svchost.com 1360 65ECC7~1.EXE 820 svchost.com 2096 65ECC7~1.EXE 912 svchost.com 1736 65ECC7~1.EXE 944 svchost.com 2796 65ECC7~1.EXE 2564 svchost.com 2012 65ECC7~1.EXE 1604 svchost.com 2856 65ECC7~1.EXE 2312 svchost.com 2924 65ECC7~1.EXE 2984 svchost.com 2892 65ECC7~1.EXE 2760 svchost.com 2896 65ECC7~1.EXE 2776 svchost.com 1640 65ECC7~1.EXE 2380 svchost.com 1332 65ECC7~1.EXE 2764 svchost.com 744 65ECC7~1.EXE 2668 svchost.com 2336 65ECC7~1.EXE 2212 svchost.com 632 65ECC7~1.EXE 3064 svchost.com 2184 65ECC7~1.EXE 2280 svchost.com 2364 65ECC7~1.EXE 2272 svchost.com 2480 65ECC7~1.EXE 1284 svchost.com 1792 65ECC7~1.EXE 1804 svchost.com 2324 65ECC7~1.EXE 992 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 2424 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 2424 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 2996 svchost.com 2996 svchost.com 2980 svchost.com 2980 svchost.com 2792 svchost.com 2792 svchost.com 2704 svchost.com 2704 svchost.com 744 svchost.com 744 svchost.com 3060 svchost.com 3060 svchost.com 1832 svchost.com 1832 svchost.com 888 svchost.com 888 svchost.com 2040 svchost.com 2040 svchost.com 2080 svchost.com 2080 svchost.com 916 svchost.com 916 svchost.com 2424 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 524 svchost.com 2140 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 524 svchost.com 2256 svchost.com 2256 svchost.com 820 svchost.com 820 svchost.com 2424 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 912 svchost.com 912 svchost.com 944 svchost.com 944 svchost.com 2564 svchost.com 2564 svchost.com 1604 svchost.com 1604 svchost.com 2312 svchost.com 2312 svchost.com 2984 svchost.com 2984 svchost.com 2760 svchost.com 2760 svchost.com 2776 svchost.com 2776 svchost.com 2380 svchost.com 2380 svchost.com 2764 svchost.com 2764 svchost.com 2668 svchost.com 2668 svchost.com 2424 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 2212 svchost.com 2212 svchost.com 3064 svchost.com 3064 svchost.com 2280 svchost.com 2280 svchost.com 2272 svchost.com 2272 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2424 wrote to memory of 2140 2424 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 29 PID 2424 wrote to memory of 2140 2424 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 29 PID 2424 wrote to memory of 2140 2424 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 29 PID 2424 wrote to memory of 2140 2424 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 29 PID 2140 wrote to memory of 2996 2140 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 30 PID 2140 wrote to memory of 2996 2140 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 30 PID 2140 wrote to memory of 2996 2140 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 30 PID 2140 wrote to memory of 2996 2140 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 30 PID 2996 wrote to memory of 2428 2996 svchost.com 31 PID 2996 wrote to memory of 2428 2996 svchost.com 31 PID 2996 wrote to memory of 2428 2996 svchost.com 31 PID 2996 wrote to memory of 2428 2996 svchost.com 31 PID 2428 wrote to memory of 2980 2428 65ECC7~1.EXE 32 PID 2428 wrote to memory of 2980 2428 65ECC7~1.EXE 32 PID 2428 wrote to memory of 2980 2428 65ECC7~1.EXE 32 PID 2428 wrote to memory of 2980 2428 65ECC7~1.EXE 32 PID 2980 wrote to memory of 2920 2980 svchost.com 33 PID 2980 wrote to memory of 2920 2980 svchost.com 33 PID 2980 wrote to memory of 2920 2980 svchost.com 33 PID 2980 wrote to memory of 2920 2980 svchost.com 33 PID 2920 wrote to memory of 2792 2920 65ECC7~1.EXE 34 PID 2920 wrote to memory of 2792 2920 65ECC7~1.EXE 34 PID 2920 wrote to memory of 2792 2920 65ECC7~1.EXE 34 PID 2920 wrote to memory of 2792 2920 65ECC7~1.EXE 34 PID 2792 wrote to memory of 2092 2792 svchost.com 35 PID 2792 wrote to memory of 2092 2792 svchost.com 35 PID 2792 wrote to memory of 2092 2792 svchost.com 35 PID 2792 wrote to memory of 2092 2792 svchost.com 35 PID 2092 wrote to memory of 2704 2092 65ECC7~1.EXE 36 PID 2092 wrote to memory of 2704 2092 65ECC7~1.EXE 36 PID 2092 wrote to memory of 2704 2092 65ECC7~1.EXE 36 PID 2092 wrote to memory of 2704 2092 65ECC7~1.EXE 36 PID 2704 wrote to memory of 1996 2704 svchost.com 37 PID 2704 wrote to memory of 1996 2704 svchost.com 37 PID 2704 wrote to memory of 1996 2704 svchost.com 37 PID 2704 wrote to memory of 1996 2704 svchost.com 37 PID 1996 wrote to memory of 744 1996 65ECC7~1.EXE 77 PID 1996 wrote to memory of 744 1996 65ECC7~1.EXE 77 PID 1996 wrote to memory of 744 1996 65ECC7~1.EXE 77 PID 1996 wrote to memory of 744 1996 65ECC7~1.EXE 77 PID 744 wrote to memory of 2536 744 svchost.com 39 PID 744 wrote to memory of 2536 744 svchost.com 39 PID 744 wrote to memory of 2536 744 svchost.com 39 PID 744 wrote to memory of 2536 744 svchost.com 39 PID 2536 wrote to memory of 3060 2536 65ECC7~1.EXE 40 PID 2536 wrote to memory of 3060 2536 65ECC7~1.EXE 40 PID 2536 wrote to memory of 3060 2536 65ECC7~1.EXE 40 PID 2536 wrote to memory of 3060 2536 65ECC7~1.EXE 40 PID 3060 wrote to memory of 2612 3060 svchost.com 41 PID 3060 wrote to memory of 2612 3060 svchost.com 41 PID 3060 wrote to memory of 2612 3060 svchost.com 41 PID 3060 wrote to memory of 2612 3060 svchost.com 41 PID 2612 wrote to memory of 1832 2612 65ECC7~1.EXE 42 PID 2612 wrote to memory of 1832 2612 65ECC7~1.EXE 42 PID 2612 wrote to memory of 1832 2612 65ECC7~1.EXE 42 PID 2612 wrote to memory of 1832 2612 65ECC7~1.EXE 42 PID 1832 wrote to memory of 2636 1832 svchost.com 43 PID 1832 wrote to memory of 2636 1832 svchost.com 43 PID 1832 wrote to memory of 2636 1832 svchost.com 43 PID 1832 wrote to memory of 2636 1832 svchost.com 43 PID 2636 wrote to memory of 888 2636 65ECC7~1.EXE 129 PID 2636 wrote to memory of 888 2636 65ECC7~1.EXE 129 PID 2636 wrote to memory of 888 2636 65ECC7~1.EXE 129 PID 2636 wrote to memory of 888 2636 65ECC7~1.EXE 129
Processes
-
C:\Users\Admin\AppData\Local\Temp\65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe"C:\Users\Admin\AppData\Local\Temp\65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE18⤵
- Executes dropped EXE
PID:1032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE20⤵
- Executes dropped EXE
PID:2676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE22⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:916 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE24⤵
- Executes dropped EXE
PID:824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE26⤵
- Executes dropped EXE
PID:2476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE28⤵
- Executes dropped EXE
PID:1360 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE30⤵
- Executes dropped EXE
PID:2096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE34⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE36⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE38⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE40⤵
- Executes dropped EXE
PID:2924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE44⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE46⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE48⤵
- Executes dropped EXE
PID:1332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE50⤵
- Executes dropped EXE
PID:744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE54⤵
- Executes dropped EXE
PID:632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE58⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE60⤵
- Executes dropped EXE
PID:2480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"61⤵
- Executes dropped EXE
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE62⤵
- Executes dropped EXE
PID:1792 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE64⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"65⤵
- Executes dropped EXE
PID:992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE66⤵
- Drops file in Windows directory
PID:1704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE68⤵PID:1752
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"69⤵
- System Location Discovery: System Language Discovery
PID:304 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE70⤵
- Drops file in Windows directory
PID:1044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"71⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE72⤵PID:2288
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE74⤵PID:740
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"75⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE76⤵PID:1720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"77⤵
- Drops file in Windows directory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE78⤵
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"79⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE80⤵
- Drops file in Windows directory
PID:2732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"81⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE82⤵PID:1380
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"83⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE84⤵
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"85⤵
- Drops file in Windows directory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE86⤵PID:2708
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"87⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE88⤵PID:1724
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"89⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:288 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE90⤵PID:2660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"91⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE92⤵PID:1264
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"93⤵
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE94⤵
- Drops file in Windows directory
PID:2764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"95⤵
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE96⤵PID:2844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"97⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE98⤵
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"99⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE100⤵PID:1756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"101⤵
- System Location Discovery: System Language Discovery
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE102⤵PID:888
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"103⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE104⤵PID:2180
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"105⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE106⤵
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"107⤵
- System Location Discovery: System Language Discovery
PID:900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE108⤵
- Drops file in Windows directory
PID:1560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"109⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE110⤵
- System Location Discovery: System Language Discovery
PID:400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE112⤵PID:1780
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"113⤵PID:756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE114⤵PID:1776
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"115⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE116⤵PID:2652
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE118⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"119⤵
- Drops file in Windows directory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE120⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"121⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE122⤵PID:1712
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-