Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-01-2025 20:01
Behavioral task
behavioral1
Sample
1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe
Resource
win10v2004-20241007-en
General
-
Target
1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe
-
Size
3.8MB
-
MD5
0e2672b7471cd2eb1a8d6b324192eac7
-
SHA1
25d8f4c9c25188dc61c3d4fd7e46de80d5f4d542
-
SHA256
1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5
-
SHA512
d827a62640f255976685fafff69d1ae1f4c9d198e622d3eaf864e89f738295464ee89724fcb45d662a67527faf2ba369b19109be0dd1d7740056f229817dd43c
-
SSDEEP
49152:CjP3KQLTi1GL6tSXAt9J4W+8Z0+0GD0AGeuVEusJ6LNzOeL0GKVIeCjF826If2y:0S3lSeuVlcm7fOKA
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral1/files/0x000f000000015677-2.dat family_neshta behavioral1/files/0x0001000000010314-20.dat family_neshta behavioral1/files/0x0001000000010312-19.dat family_neshta behavioral1/files/0x000100000000f872-96.dat family_neshta behavioral1/memory/1492-77-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x000100000000f7e6-81.dat family_neshta behavioral1/memory/2200-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x0008000000015685-73.dat family_neshta behavioral1/files/0x000100000000f776-72.dat family_neshta behavioral1/memory/592-59-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3044-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x0001000000010b94-101.dat family_neshta behavioral1/files/0x0001000000010366-104.dat family_neshta behavioral1/files/0x00010000000114c6-98.dat family_neshta behavioral1/files/0x0001000000010c12-107.dat family_neshta behavioral1/files/0x0001000000010f30-113.dat family_neshta behavioral1/files/0x00010000000118e3-119.dat family_neshta behavioral1/files/0x00010000000118ea-122.dat family_neshta behavioral1/files/0x0001000000011876-116.dat family_neshta behavioral1/files/0x0001000000011a18-125.dat family_neshta behavioral1/files/0x00010000000103d9-128.dat family_neshta behavioral1/files/0x00010000000117fc-110.dat family_neshta behavioral1/files/0x00010000000108f6-134.dat family_neshta behavioral1/memory/2608-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x000300000001215c-137.dat family_neshta behavioral1/files/0x000300000001219c-146.dat family_neshta behavioral1/files/0x000300000001215b-152.dat family_neshta behavioral1/files/0x000300000001219a-158.dat family_neshta behavioral1/files/0x000300000001219d-155.dat family_neshta behavioral1/files/0x000300000001215e-149.dat family_neshta behavioral1/files/0x000300000001215d-140.dat family_neshta behavioral1/memory/2604-45-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2584-31-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2312-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x0001000000010693-161.dat family_neshta behavioral1/files/0x0002000000010924-164.dat family_neshta behavioral1/files/0x000100000001070c-18.dat family_neshta behavioral1/files/0x00010000000107e5-17.dat family_neshta behavioral1/memory/2188-177-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1996-176-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/664-194-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1092-193-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1528-223-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2256-226-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1780-231-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2484-230-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/652-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1276-238-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2512-247-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/584-246-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2280-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1000-254-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2980-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2524-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2932-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1556-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2780-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2728-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2588-298-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1700-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1396-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2816-305-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/588-314-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2236-313-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 2772 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe 2312 svchost.com 2584 1762A0~1.EXE 2604 svchost.com 2608 1762A0~1.EXE 3044 svchost.com 592 1762A0~1.EXE 1492 svchost.com 2200 1762A0~1.EXE 2188 svchost.com 1996 1762A0~1.EXE 664 svchost.com 1092 1762A0~1.EXE 1528 svchost.com 2256 1762A0~1.EXE 1780 svchost.com 2484 1762A0~1.EXE 652 svchost.com 1276 1762A0~1.EXE 2512 svchost.com 584 1762A0~1.EXE 2280 svchost.com 1000 1762A0~1.EXE 2524 svchost.com 2980 1762A0~1.EXE 1556 svchost.com 2932 1762A0~1.EXE 2780 svchost.com 2728 1762A0~1.EXE 2588 svchost.com 1700 1762A0~1.EXE 1396 svchost.com 2816 1762A0~1.EXE 588 svchost.com 2236 1762A0~1.EXE 1804 svchost.com 2876 1762A0~1.EXE 1344 svchost.com 2712 1762A0~1.EXE 2664 svchost.com 2016 1762A0~1.EXE 2592 svchost.com 2848 1762A0~1.EXE 1632 svchost.com 2000 1762A0~1.EXE 2908 svchost.com 2956 1762A0~1.EXE 2948 svchost.com 2216 1762A0~1.EXE 2128 svchost.com 2108 1762A0~1.EXE 672 svchost.com 2632 1762A0~1.EXE 2036 svchost.com 2196 1762A0~1.EXE 1204 svchost.com 1964 1762A0~1.EXE 1056 svchost.com 1684 1762A0~1.EXE 1288 svchost.com 772 1762A0~1.EXE 1528 svchost.com 1676 1762A0~1.EXE 1068 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 2668 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe 2668 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe 2312 svchost.com 2312 svchost.com 2604 svchost.com 2604 svchost.com 3044 svchost.com 3044 svchost.com 1492 svchost.com 1492 svchost.com 2668 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe 2772 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe 2188 svchost.com 2188 svchost.com 664 svchost.com 664 svchost.com 1528 svchost.com 1528 svchost.com 1780 svchost.com 1780 svchost.com 652 svchost.com 652 svchost.com 2512 svchost.com 2512 svchost.com 2280 svchost.com 2280 svchost.com 2524 svchost.com 2524 svchost.com 1556 svchost.com 1556 svchost.com 2780 svchost.com 2780 svchost.com 2588 svchost.com 2588 svchost.com 1396 svchost.com 1396 svchost.com 588 svchost.com 588 svchost.com 1804 svchost.com 1804 svchost.com 1344 svchost.com 1344 svchost.com 2664 svchost.com 2664 svchost.com 2592 svchost.com 2592 svchost.com 1632 svchost.com 1632 svchost.com 2908 svchost.com 2908 svchost.com 2948 svchost.com 2948 svchost.com 2128 svchost.com 2128 svchost.com 672 svchost.com 672 svchost.com 2036 svchost.com 2036 svchost.com 1204 svchost.com 1204 svchost.com 1056 svchost.com 1056 svchost.com 1288 svchost.com 1288 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys 1762A0~1.EXE File opened for modification C:\Windows\svchost.com 1762A0~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 1762A0~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 1762A0~1.EXE File opened for modification C:\Windows\directx.sys 1762A0~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 1762A0~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 1762A0~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 1762A0~1.EXE File opened for modification C:\Windows\directx.sys 1762A0~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 1762A0~1.EXE File opened for modification C:\Windows\svchost.com 1762A0~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 1762A0~1.EXE File opened for modification C:\Windows\svchost.com 1762A0~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 1762A0~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 1762A0~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 1762A0~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 1762A0~1.EXE File opened for modification C:\Windows\directx.sys 1762A0~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 1762A0~1.EXE File opened for modification C:\Windows\directx.sys 1762A0~1.EXE File opened for modification C:\Windows\directx.sys 1762A0~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 1762A0~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 1762A0~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 1762A0~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 1762A0~1.EXE File opened for modification C:\Windows\svchost.com 1762A0~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1762A0~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2772 2668 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe 30 PID 2668 wrote to memory of 2772 2668 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe 30 PID 2668 wrote to memory of 2772 2668 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe 30 PID 2668 wrote to memory of 2772 2668 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe 30 PID 2772 wrote to memory of 2312 2772 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe 31 PID 2772 wrote to memory of 2312 2772 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe 31 PID 2772 wrote to memory of 2312 2772 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe 31 PID 2772 wrote to memory of 2312 2772 1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe 31 PID 2312 wrote to memory of 2584 2312 svchost.com 32 PID 2312 wrote to memory of 2584 2312 svchost.com 32 PID 2312 wrote to memory of 2584 2312 svchost.com 32 PID 2312 wrote to memory of 2584 2312 svchost.com 32 PID 2584 wrote to memory of 2604 2584 1762A0~1.EXE 33 PID 2584 wrote to memory of 2604 2584 1762A0~1.EXE 33 PID 2584 wrote to memory of 2604 2584 1762A0~1.EXE 33 PID 2584 wrote to memory of 2604 2584 1762A0~1.EXE 33 PID 2604 wrote to memory of 2608 2604 svchost.com 34 PID 2604 wrote to memory of 2608 2604 svchost.com 34 PID 2604 wrote to memory of 2608 2604 svchost.com 34 PID 2604 wrote to memory of 2608 2604 svchost.com 34 PID 2608 wrote to memory of 3044 2608 1762A0~1.EXE 35 PID 2608 wrote to memory of 3044 2608 1762A0~1.EXE 35 PID 2608 wrote to memory of 3044 2608 1762A0~1.EXE 35 PID 2608 wrote to memory of 3044 2608 1762A0~1.EXE 35 PID 3044 wrote to memory of 592 3044 svchost.com 36 PID 3044 wrote to memory of 592 3044 svchost.com 36 PID 3044 wrote to memory of 592 3044 svchost.com 36 PID 3044 wrote to memory of 592 3044 svchost.com 36 PID 592 wrote to memory of 1492 592 1762A0~1.EXE 37 PID 592 wrote to memory of 1492 592 1762A0~1.EXE 37 PID 592 wrote to memory of 1492 592 1762A0~1.EXE 37 PID 592 wrote to memory of 1492 592 1762A0~1.EXE 37 PID 1492 wrote to memory of 2200 1492 svchost.com 38 PID 1492 wrote to memory of 2200 1492 svchost.com 38 PID 1492 wrote to memory of 2200 1492 svchost.com 38 PID 1492 wrote to memory of 2200 1492 svchost.com 38 PID 2200 wrote to memory of 2188 2200 1762A0~1.EXE 39 PID 2200 wrote to memory of 2188 2200 1762A0~1.EXE 39 PID 2200 wrote to memory of 2188 2200 1762A0~1.EXE 39 PID 2200 wrote to memory of 2188 2200 1762A0~1.EXE 39 PID 2188 wrote to memory of 1996 2188 svchost.com 40 PID 2188 wrote to memory of 1996 2188 svchost.com 40 PID 2188 wrote to memory of 1996 2188 svchost.com 40 PID 2188 wrote to memory of 1996 2188 svchost.com 40 PID 1996 wrote to memory of 664 1996 1762A0~1.EXE 41 PID 1996 wrote to memory of 664 1996 1762A0~1.EXE 41 PID 1996 wrote to memory of 664 1996 1762A0~1.EXE 41 PID 1996 wrote to memory of 664 1996 1762A0~1.EXE 41 PID 664 wrote to memory of 1092 664 svchost.com 42 PID 664 wrote to memory of 1092 664 svchost.com 42 PID 664 wrote to memory of 1092 664 svchost.com 42 PID 664 wrote to memory of 1092 664 svchost.com 42 PID 1092 wrote to memory of 1528 1092 1762A0~1.EXE 91 PID 1092 wrote to memory of 1528 1092 1762A0~1.EXE 91 PID 1092 wrote to memory of 1528 1092 1762A0~1.EXE 91 PID 1092 wrote to memory of 1528 1092 1762A0~1.EXE 91 PID 1528 wrote to memory of 2256 1528 svchost.com 44 PID 1528 wrote to memory of 2256 1528 svchost.com 44 PID 1528 wrote to memory of 2256 1528 svchost.com 44 PID 1528 wrote to memory of 2256 1528 svchost.com 44 PID 2256 wrote to memory of 1780 2256 1762A0~1.EXE 45 PID 2256 wrote to memory of 1780 2256 1762A0~1.EXE 45 PID 2256 wrote to memory of 1780 2256 1762A0~1.EXE 45 PID 2256 wrote to memory of 1780 2256 1762A0~1.EXE 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe"C:\Users\Admin\AppData\Local\Temp\1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\1762a0a3de3d353469925c435ceafcfeebe005d3735386439ff0f0131f5925b5.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE18⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:652 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE20⤵
- Executes dropped EXE
PID:1276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE22⤵
- Executes dropped EXE
PID:584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE24⤵
- Executes dropped EXE
PID:1000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE26⤵
- Executes dropped EXE
PID:2980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE28⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE30⤵
- Executes dropped EXE
PID:2728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE32⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE34⤵
- Executes dropped EXE
PID:2816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE36⤵
- Executes dropped EXE
PID:2236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE40⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE42⤵
- Executes dropped EXE
PID:2016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE44⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE48⤵
- Executes dropped EXE
PID:2956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE50⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE52⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE54⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE56⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"59⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE60⤵
- Executes dropped EXE
PID:1684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"61⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE62⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"63⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE64⤵
- Executes dropped EXE
PID:1676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"65⤵
- Executes dropped EXE
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE66⤵PID:2484
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"67⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE68⤵
- Drops file in Windows directory
PID:2352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"69⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE70⤵PID:2304
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"71⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE72⤵PID:1256
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"73⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE74⤵PID:2980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"75⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE76⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"77⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE78⤵PID:2728
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"79⤵
- Drops file in Windows directory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE80⤵PID:2588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"81⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE82⤵
- Drops file in Windows directory
PID:2816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"83⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE84⤵PID:2164
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"85⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE86⤵PID:1412
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"87⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE88⤵
- Drops file in Windows directory
PID:2720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"89⤵
- Drops file in Windows directory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE90⤵PID:1968
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"91⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE92⤵
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"93⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE94⤵PID:2840
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"95⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE96⤵
- System Location Discovery: System Language Discovery
PID:888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"97⤵
- Drops file in Windows directory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE98⤵
- System Location Discovery: System Language Discovery
PID:2520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE100⤵PID:264
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"101⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE102⤵PID:2732
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"103⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE104⤵PID:444
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"105⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE106⤵PID:1136
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"107⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE108⤵PID:3056
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"109⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE110⤵PID:772
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"111⤵PID:236
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE112⤵PID:1716
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"113⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE114⤵
- Drops file in Windows directory
PID:3032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"115⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE116⤵PID:1624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"117⤵
- Drops file in Windows directory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE118⤵PID:1740
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"119⤵
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE120⤵PID:764
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE"121⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1762A0~1.EXE122⤵PID:2932
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-