Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 06:58
Behavioral task
behavioral1
Sample
ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe
Resource
win10v2004-20241007-en
General
-
Target
ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe
-
Size
218KB
-
MD5
f1f1d0ad99a6e3e4d66b45cf74aa64b9
-
SHA1
b4b7752d04880c9d176ab25339c6b4ccd5a5cf09
-
SHA256
ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778
-
SHA512
6f50c1ab8a992e4859e917abf00c29a9fa2f118a59ed8d654c198ea7e7ac0163f3c908dc7963e48d914f566820413a2e9a258092bfa05b15af8f5df5e6edc458
-
SSDEEP
6144:k90ICFBj7tf/k+AbAyUeRUqttyH7xOc6H5c6HcT66vlmrL:ZBj7hybABevai
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral1/files/0x0001000000010319-21.dat family_neshta behavioral1/files/0x0006000000019240-25.dat family_neshta behavioral1/files/0x0006000000019246-33.dat family_neshta behavioral1/files/0x000b000000010326-34.dat family_neshta behavioral1/files/0x0001000000010317-36.dat family_neshta behavioral1/files/0x000100000001064f-35.dat family_neshta behavioral1/memory/2632-53-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2704-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2788-67-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2684-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/572-80-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2560-79-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3024-95-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1308-94-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1728-108-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1296-107-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2392-125-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2464-124-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x000100000000f7d9-123.dat family_neshta behavioral1/files/0x000100000000f7ec-138.dat family_neshta behavioral1/files/0x000100000000f709-148.dat family_neshta behavioral1/files/0x000100000000f834-151.dat family_neshta behavioral1/files/0x000100000000f87a-152.dat family_neshta behavioral1/files/0x000100000000f833-149.dat family_neshta behavioral1/memory/2252-156-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1192-155-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2672-165-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/328-164-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1172-182-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1596-181-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1756-199-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1536-198-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/696-207-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/836-208-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1480-221-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2984-222-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2268-231-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/996-230-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/872-252-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1580-251-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2080-268-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2132-269-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2104-281-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2880-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2784-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2704-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2604-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2624-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2520-309-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2652-310-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1824-323-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2944-324-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1028-332-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/840-331-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/764-340-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1728-339-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1908-348-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1956-347-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1276-355-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2476-356-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1112-364-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2332-363-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2832-372-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1328-371-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 1488 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 2304 svchost.exe 2136 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 2632 svchost.com 2724 svchost.exe 2704 DDF12A~1.EXE 2788 svchost.com 2684 DDF12A~1.EXE 572 svchost.com 2560 DDF12A~1.EXE 3024 svchost.com 1308 DDF12A~1.EXE 1728 svchost.com 1296 DDF12A~1.EXE 2392 svchost.com 2464 DDF12A~1.EXE 2252 svchost.com 1192 DDF12A~1.EXE 328 svchost.com 2672 DDF12A~1.EXE 1172 svchost.com 1596 DDF12A~1.EXE 1756 svchost.com 1536 DDF12A~1.EXE 836 svchost.com 696 DDF12A~1.EXE 2984 svchost.com 1480 DDF12A~1.EXE 2268 svchost.com 996 DDF12A~1.EXE 872 svchost.com 1580 DDF12A~1.EXE 2132 svchost.com 2080 DDF12A~1.EXE 2104 svchost.com 2880 DDF12A~1.EXE 2784 svchost.com 2704 DDF12A~1.EXE 2604 svchost.com 2624 DDF12A~1.EXE 2652 svchost.com 2520 DDF12A~1.EXE 2944 svchost.com 1824 DDF12A~1.EXE 1028 svchost.com 840 DDF12A~1.EXE 764 svchost.com 1728 DDF12A~1.EXE 1908 svchost.com 1956 DDF12A~1.EXE 1276 svchost.com 2476 DDF12A~1.EXE 1112 svchost.com 2332 DDF12A~1.EXE 2832 svchost.com 1328 DDF12A~1.EXE 624 svchost.com 1828 DDF12A~1.EXE 112 svchost.com 1048 DDF12A~1.EXE 1508 svchost.com 1172 DDF12A~1.EXE 1504 svchost.com 1672 DDF12A~1.EXE -
Loads dropped DLL 64 IoCs
pid Process 1384 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 1384 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 2304 svchost.exe 2304 svchost.exe 2632 svchost.com 2632 svchost.com 2788 svchost.com 2788 svchost.com 572 svchost.com 572 svchost.com 3024 svchost.com 3024 svchost.com 1728 svchost.com 1728 svchost.com 2392 svchost.com 2392 svchost.com 2252 svchost.com 2136 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 2252 svchost.com 1384 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 328 svchost.com 328 svchost.com 1172 svchost.com 1172 svchost.com 1756 svchost.com 1756 svchost.com 1384 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 836 svchost.com 836 svchost.com 2984 svchost.com 2984 svchost.com 2268 svchost.com 2268 svchost.com 872 svchost.com 872 svchost.com 2132 svchost.com 2132 svchost.com 2104 svchost.com 2104 svchost.com 2784 svchost.com 2784 svchost.com 2604 svchost.com 2604 svchost.com 2652 svchost.com 2652 svchost.com 2944 svchost.com 2944 svchost.com 1028 svchost.com 1028 svchost.com 764 svchost.com 764 svchost.com 1908 svchost.com 1908 svchost.com 1276 svchost.com 1276 svchost.com 1112 svchost.com 1112 svchost.com 2832 svchost.com 2832 svchost.com 624 svchost.com 624 svchost.com 112 svchost.com 112 svchost.com 1508 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1384 wrote to memory of 1488 1384 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 31 PID 1384 wrote to memory of 1488 1384 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 31 PID 1384 wrote to memory of 1488 1384 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 31 PID 1384 wrote to memory of 1488 1384 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 31 PID 1488 wrote to memory of 2304 1488 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 32 PID 1488 wrote to memory of 2304 1488 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 32 PID 1488 wrote to memory of 2304 1488 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 32 PID 1488 wrote to memory of 2304 1488 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 32 PID 2304 wrote to memory of 2136 2304 svchost.exe 33 PID 2304 wrote to memory of 2136 2304 svchost.exe 33 PID 2304 wrote to memory of 2136 2304 svchost.exe 33 PID 2304 wrote to memory of 2136 2304 svchost.exe 33 PID 2136 wrote to memory of 2632 2136 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 34 PID 2136 wrote to memory of 2632 2136 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 34 PID 2136 wrote to memory of 2632 2136 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 34 PID 2136 wrote to memory of 2632 2136 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 34 PID 2632 wrote to memory of 2704 2632 svchost.com 36 PID 2632 wrote to memory of 2704 2632 svchost.com 36 PID 2632 wrote to memory of 2704 2632 svchost.com 36 PID 2632 wrote to memory of 2704 2632 svchost.com 36 PID 2704 wrote to memory of 2788 2704 DDF12A~1.EXE 37 PID 2704 wrote to memory of 2788 2704 DDF12A~1.EXE 37 PID 2704 wrote to memory of 2788 2704 DDF12A~1.EXE 37 PID 2704 wrote to memory of 2788 2704 DDF12A~1.EXE 37 PID 2788 wrote to memory of 2684 2788 svchost.com 38 PID 2788 wrote to memory of 2684 2788 svchost.com 38 PID 2788 wrote to memory of 2684 2788 svchost.com 38 PID 2788 wrote to memory of 2684 2788 svchost.com 38 PID 2684 wrote to memory of 572 2684 DDF12A~1.EXE 39 PID 2684 wrote to memory of 572 2684 DDF12A~1.EXE 39 PID 2684 wrote to memory of 572 2684 DDF12A~1.EXE 39 PID 2684 wrote to memory of 572 2684 DDF12A~1.EXE 39 PID 572 wrote to memory of 2560 572 svchost.com 40 PID 572 wrote to memory of 2560 572 svchost.com 40 PID 572 wrote to memory of 2560 572 svchost.com 40 PID 572 wrote to memory of 2560 572 svchost.com 40 PID 2560 wrote to memory of 3024 2560 DDF12A~1.EXE 41 PID 2560 wrote to memory of 3024 2560 DDF12A~1.EXE 41 PID 2560 wrote to memory of 3024 2560 DDF12A~1.EXE 41 PID 2560 wrote to memory of 3024 2560 DDF12A~1.EXE 41 PID 3024 wrote to memory of 1308 3024 svchost.com 42 PID 3024 wrote to memory of 1308 3024 svchost.com 42 PID 3024 wrote to memory of 1308 3024 svchost.com 42 PID 3024 wrote to memory of 1308 3024 svchost.com 42 PID 1308 wrote to memory of 1728 1308 DDF12A~1.EXE 78 PID 1308 wrote to memory of 1728 1308 DDF12A~1.EXE 78 PID 1308 wrote to memory of 1728 1308 DDF12A~1.EXE 78 PID 1308 wrote to memory of 1728 1308 DDF12A~1.EXE 78 PID 1728 wrote to memory of 1296 1728 svchost.com 44 PID 1728 wrote to memory of 1296 1728 svchost.com 44 PID 1728 wrote to memory of 1296 1728 svchost.com 44 PID 1728 wrote to memory of 1296 1728 svchost.com 44 PID 1296 wrote to memory of 2392 1296 DDF12A~1.EXE 45 PID 1296 wrote to memory of 2392 1296 DDF12A~1.EXE 45 PID 1296 wrote to memory of 2392 1296 DDF12A~1.EXE 45 PID 1296 wrote to memory of 2392 1296 DDF12A~1.EXE 45 PID 2392 wrote to memory of 2464 2392 svchost.com 46 PID 2392 wrote to memory of 2464 2392 svchost.com 46 PID 2392 wrote to memory of 2464 2392 svchost.com 46 PID 2392 wrote to memory of 2464 2392 svchost.com 46 PID 2464 wrote to memory of 2252 2464 DDF12A~1.EXE 47 PID 2464 wrote to memory of 2252 2464 DDF12A~1.EXE 47 PID 2464 wrote to memory of 2252 2464 DDF12A~1.EXE 47 PID 2464 wrote to memory of 2252 2464 DDF12A~1.EXE 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe"C:\Users\Admin\AppData\Local\Temp\ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\3582-490\ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE18⤵
- Executes dropped EXE
PID:1192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:328 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE20⤵
- Executes dropped EXE
PID:2672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE22⤵
- Executes dropped EXE
PID:1596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE24⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE26⤵
- Executes dropped EXE
PID:696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE28⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE30⤵
- Executes dropped EXE
PID:996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE32⤵
- Executes dropped EXE
PID:1580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE34⤵
- Executes dropped EXE
PID:2080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE38⤵
- Executes dropped EXE
PID:2704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE40⤵
- Executes dropped EXE
PID:2624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE42⤵
- Executes dropped EXE
PID:2520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE44⤵
- Executes dropped EXE
PID:1824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE48⤵
- Executes dropped EXE
PID:1728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE50⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE52⤵
- Executes dropped EXE
PID:2476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE54⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE56⤵
- Executes dropped EXE
PID:1328 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:624 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE58⤵
- Executes dropped EXE
PID:1828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"59⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE60⤵
- Executes dropped EXE
PID:1048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE62⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE64⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"65⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE66⤵PID:1820
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"67⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE68⤵
- Drops file in Windows directory
PID:2448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"69⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE70⤵PID:2764
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"71⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE72⤵PID:2356
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE74⤵PID:2056
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE76⤵PID:2068
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"77⤵
- Drops file in Windows directory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE78⤵PID:2132
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"79⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE80⤵
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"81⤵
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE82⤵
- Drops file in Windows directory
PID:2496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"83⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE84⤵PID:2800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"85⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE86⤵PID:2552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"87⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE88⤵PID:2948
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"89⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE90⤵PID:2536
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"91⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE92⤵PID:1364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"93⤵
- Drops file in Windows directory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE94⤵
- System Location Discovery: System Language Discovery
PID:764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"95⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE96⤵PID:340
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"97⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE98⤵PID:1492
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE100⤵PID:2840
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"101⤵
- Drops file in Windows directory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE102⤵
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"103⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE104⤵
- Drops file in Windows directory
PID:624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"105⤵
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE106⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"107⤵
- System Location Discovery: System Language Discovery
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE108⤵PID:1532
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"109⤵
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE110⤵PID:2588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"111⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE112⤵
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"113⤵PID:604
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE114⤵PID:1652
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"115⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE116⤵PID:2268
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE118⤵PID:1964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"119⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE120⤵PID:1688
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"121⤵PID:1488
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE122⤵PID:2852
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-