Analysis
-
max time kernel
151s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
22-06-2022 12:55
Static task
static1
Behavioral task
behavioral1
Sample
a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe
Resource
win10v2004-20220414-en
General
-
Target
a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe
-
Size
3.2MB
-
MD5
2df68cae0c75613b9bea1c10c1519136
-
SHA1
71a31818afbc0bfff98a1642802665e70c194fda
-
SHA256
a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc
-
SHA512
7aad207b0af831dc8a6e55170f89329c6986d4a9931745ff105cea03768bb5c8eb07f27e03a7935188084edbc31caf83135e5c118182b053eb42ae4ac482b8e7
Malware Config
Signatures
-
Detect Neshta Payload 52 IoCs
Processes:
resource yara_rule \Users\Admin\AppData\Local\Temp\3582-490\a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe family_neshta \Users\Admin\AppData\Local\Temp\3582-490\a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe family_neshta \Users\Admin\AppData\Local\Temp\._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe family_neshta \Users\Admin\AppData\Local\Temp\._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe family_neshta C:\Users\Admin\AppData\Local\Temp\._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe family_neshta C:\Users\Admin\AppData\Local\Temp\._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe family_neshta C:\Windows\svchost.com family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE family_neshta C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe family_neshta C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE family_neshta \Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE family_neshta \Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE family_neshta \Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE family_neshta \Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE family_neshta C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe family_neshta C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE family_neshta C:\Windows\svchost.com family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE family_neshta \Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE family_neshta \Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE family_neshta \Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE family_neshta \Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE family_neshta C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE family_neshta C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE family_neshta C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exesvchost.com_CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com_CACHE~2.EXESynaptics.exe._cache__CACHE~2.EXEsvchost.com_CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com_CACHE~2.EXE._cache__CACHE~2.EXEsvchost.com_CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com_CACHE~2.EXE._cache__CACHE~2.EXEsvchost.com_CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com_CACHE~2.EXE._cache__CACHE~2.EXEsvchost.com_CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com_CACHE~2.EXE._cache__CACHE~2.EXEsvchost.com_CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com_CACHE~2.EXE._cache__CACHE~2.EXEsvchost.com_CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com_CACHE~2.EXE._cache__CACHE~2.EXEsvchost.com_CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com_CACHE~2.EXE._cache__CACHE~2.EXEsvchost.com_CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com_CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com_CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com_CACHE~1.EXE._cache__CACHE~1.EXEsvchost.compid process 952 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe 908 ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe 1956 svchost.com 436 _CACHE~1.EXE 1352 ._cache__CACHE~1.EXE 540 svchost.com 1760 _CACHE~2.EXE 1620 Synaptics.exe 1480 ._cache__CACHE~2.EXE 924 svchost.com 1832 _CACHE~1.EXE 1788 ._cache__CACHE~1.EXE 1956 svchost.com 1648 _CACHE~2.EXE 1756 ._cache__CACHE~2.EXE 1000 svchost.com 1964 _CACHE~1.EXE 1124 ._cache__CACHE~1.EXE 1816 svchost.com 288 _CACHE~2.EXE 1640 ._cache__CACHE~2.EXE 792 svchost.com 608 _CACHE~1.EXE 844 ._cache__CACHE~1.EXE 1172 svchost.com 1060 _CACHE~2.EXE 1664 ._cache__CACHE~2.EXE 436 svchost.com 1204 _CACHE~1.EXE 1596 ._cache__CACHE~1.EXE 948 svchost.com 1224 _CACHE~2.EXE 868 ._cache__CACHE~2.EXE 1856 svchost.com 1468 _CACHE~1.EXE 1608 ._cache__CACHE~1.EXE 1612 svchost.com 608 _CACHE~2.EXE 588 ._cache__CACHE~2.EXE 592 svchost.com 1756 _CACHE~1.EXE 1000 ._cache__CACHE~1.EXE 1964 svchost.com 1736 _CACHE~2.EXE 992 ._cache__CACHE~2.EXE 1564 svchost.com 1840 _CACHE~1.EXE 1712 ._cache__CACHE~1.EXE 900 svchost.com 1896 _CACHE~2.EXE 1068 ._cache__CACHE~2.EXE 872 svchost.com 776 _CACHE~1.EXE 1944 ._cache__CACHE~1.EXE 1276 svchost.com 1032 _CACHE~1.EXE 628 ._cache__CACHE~1.EXE 704 svchost.com 1928 _CACHE~1.EXE 1896 ._cache__CACHE~1.EXE 1660 svchost.com 1588 _CACHE~1.EXE 1980 ._cache__CACHE~1.EXE 1816 svchost.com -
Loads dropped DLL 64 IoCs
Processes:
a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exea89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exesvchost.com_CACHE~1.EXEsvchost.com_CACHE~2.EXE._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exesvchost.com_CACHE~1.EXEsvchost.com_CACHE~2.EXEsvchost.com_CACHE~1.EXEsvchost.com_CACHE~2.EXEsvchost.com_CACHE~1.EXEsvchost.com_CACHE~2.EXEsvchost.com_CACHE~1.EXEEXCEL.EXEpid process 1228 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe 1228 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe 952 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe 952 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe 952 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe 1956 svchost.com 1956 svchost.com 436 _CACHE~1.EXE 436 _CACHE~1.EXE 436 _CACHE~1.EXE 540 svchost.com 540 svchost.com 952 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe 952 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe 1760 _CACHE~2.EXE 1760 _CACHE~2.EXE 1760 _CACHE~2.EXE 1228 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe 908 ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe 924 svchost.com 924 svchost.com 1832 _CACHE~1.EXE 1832 _CACHE~1.EXE 1832 _CACHE~1.EXE 1832 _CACHE~1.EXE 1956 svchost.com 1956 svchost.com 1648 _CACHE~2.EXE 1648 _CACHE~2.EXE 1648 _CACHE~2.EXE 1648 _CACHE~2.EXE 1000 svchost.com 1000 svchost.com 1964 _CACHE~1.EXE 1964 _CACHE~1.EXE 1964 _CACHE~1.EXE 1964 _CACHE~1.EXE 1816 svchost.com 1816 svchost.com 288 _CACHE~2.EXE 288 _CACHE~2.EXE 288 _CACHE~2.EXE 288 _CACHE~2.EXE 792 svchost.com 792 svchost.com 608 _CACHE~1.EXE 608 _CACHE~1.EXE 608 _CACHE~1.EXE 608 _CACHE~1.EXE 1172 svchost.com 1172 svchost.com 1060 _CACHE~2.EXE 1060 _CACHE~2.EXE 1060 _CACHE~2.EXE 1060 _CACHE~2.EXE 436 svchost.com 436 svchost.com 1204 _CACHE~1.EXE 1636 EXCEL.EXE 1636 EXCEL.EXE 908 ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe 1636 EXCEL.EXE 1636 EXCEL.EXE 908 ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe -
Drops file in Program Files directory 64 IoCs
Processes:
._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exea89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exedescription ioc process File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~3\SYNAPT~1\SYNAPT~1.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe -
Drops file in Windows directory 64 IoCs
Processes:
._cache__CACHE~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com._cache__CACHE~1.EXE._cache__CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com._cache__CACHE~1.EXE._cache__CACHE~1.EXE._cache__CACHE~2.EXE._cache__CACHE~1.EXE._cache__CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com._cache__CACHE~2.EXE._cache__CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com._cache__CACHE~1.EXE._cache__CACHE~1.EXE._cache__CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com._cache__CACHE~1.EXE._cache__CACHE~1.EXEsvchost.comsvchost.comsvchost.com._cache__CACHE~1.EXEsvchost.comsvchost.comsvchost.com._cache__CACHE~1.EXEsvchost.com._cache__CACHE~1.EXEsvchost.com._cache__CACHE~1.EXE._cache__CACHE~1.EXEsvchost.comsvchost.com._cache__CACHE~1.EXE._cache__CACHE~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com._cache__CACHE~1.EXE._cache__CACHE~1.EXE._cache__CACHE~1.EXE._cache__CACHE~1.EXEsvchost.comsvchost.com._cache__CACHE~1.EXEdescription ioc process File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE File opened for modification C:\Windows\directx.sys ._cache__CACHE~2.EXE File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys ._cache__CACHE~2.EXE File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
EXCEL.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor EXCEL.EXE -
Processes:
EXCEL.EXEdescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar EXCEL.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" EXCEL.EXE Key created \REGISTRY\USER\S-1-5-21-1083475884-596052423-1669053738-1000\Software\Microsoft\Internet Explorer\MenuExt EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell EXCEL.EXE -
Modifies registry class 64 IoCs
Processes:
EXCEL.EXEdescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597} EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler\ = "{42042206-2D85-11D3-8CFF-005004838597}" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shellex\IconHandler EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\ = "[open(\"%1\")]" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\htmlfile EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" EXCEL.EXE Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\ = "&Open" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Version\14 EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" EXCEL.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\application\ = "Excel" EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit EXCEL.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command EXCEL.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
Processes:
EXCEL.EXEpid process 1636 EXCEL.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
EXCEL.EXEpid process 1636 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exea89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exesvchost.com_CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com_CACHE~2.EXE._cache__CACHE~2.EXEsvchost.com_CACHE~1.EXE._cache__CACHE~1.EXEsvchost.com_CACHE~2.EXE._cache__CACHE~2.EXEdescription pid process target process PID 1228 wrote to memory of 952 1228 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe PID 1228 wrote to memory of 952 1228 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe PID 1228 wrote to memory of 952 1228 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe PID 1228 wrote to memory of 952 1228 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe PID 952 wrote to memory of 908 952 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe PID 952 wrote to memory of 908 952 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe PID 952 wrote to memory of 908 952 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe PID 952 wrote to memory of 908 952 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe PID 908 wrote to memory of 1956 908 ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe svchost.com PID 908 wrote to memory of 1956 908 ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe svchost.com PID 908 wrote to memory of 1956 908 ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe svchost.com PID 908 wrote to memory of 1956 908 ._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe svchost.com PID 1956 wrote to memory of 436 1956 svchost.com _CACHE~1.EXE PID 1956 wrote to memory of 436 1956 svchost.com _CACHE~1.EXE PID 1956 wrote to memory of 436 1956 svchost.com _CACHE~1.EXE PID 1956 wrote to memory of 436 1956 svchost.com _CACHE~1.EXE PID 436 wrote to memory of 1352 436 _CACHE~1.EXE ._cache__CACHE~1.EXE PID 436 wrote to memory of 1352 436 _CACHE~1.EXE ._cache__CACHE~1.EXE PID 436 wrote to memory of 1352 436 _CACHE~1.EXE ._cache__CACHE~1.EXE PID 436 wrote to memory of 1352 436 _CACHE~1.EXE ._cache__CACHE~1.EXE PID 1352 wrote to memory of 540 1352 ._cache__CACHE~1.EXE svchost.com PID 1352 wrote to memory of 540 1352 ._cache__CACHE~1.EXE svchost.com PID 1352 wrote to memory of 540 1352 ._cache__CACHE~1.EXE svchost.com PID 1352 wrote to memory of 540 1352 ._cache__CACHE~1.EXE svchost.com PID 540 wrote to memory of 1760 540 svchost.com _CACHE~2.EXE PID 540 wrote to memory of 1760 540 svchost.com _CACHE~2.EXE PID 540 wrote to memory of 1760 540 svchost.com _CACHE~2.EXE PID 540 wrote to memory of 1760 540 svchost.com _CACHE~2.EXE PID 952 wrote to memory of 1620 952 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe Synaptics.exe PID 952 wrote to memory of 1620 952 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe Synaptics.exe PID 952 wrote to memory of 1620 952 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe Synaptics.exe PID 952 wrote to memory of 1620 952 a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe Synaptics.exe PID 1760 wrote to memory of 1480 1760 _CACHE~2.EXE ._cache__CACHE~2.EXE PID 1760 wrote to memory of 1480 1760 _CACHE~2.EXE ._cache__CACHE~2.EXE PID 1760 wrote to memory of 1480 1760 _CACHE~2.EXE ._cache__CACHE~2.EXE PID 1760 wrote to memory of 1480 1760 _CACHE~2.EXE ._cache__CACHE~2.EXE PID 1480 wrote to memory of 924 1480 ._cache__CACHE~2.EXE svchost.com PID 1480 wrote to memory of 924 1480 ._cache__CACHE~2.EXE svchost.com PID 1480 wrote to memory of 924 1480 ._cache__CACHE~2.EXE svchost.com PID 1480 wrote to memory of 924 1480 ._cache__CACHE~2.EXE svchost.com PID 924 wrote to memory of 1832 924 svchost.com _CACHE~1.EXE PID 924 wrote to memory of 1832 924 svchost.com _CACHE~1.EXE PID 924 wrote to memory of 1832 924 svchost.com _CACHE~1.EXE PID 924 wrote to memory of 1832 924 svchost.com _CACHE~1.EXE PID 1832 wrote to memory of 1788 1832 _CACHE~1.EXE ._cache__CACHE~1.EXE PID 1832 wrote to memory of 1788 1832 _CACHE~1.EXE ._cache__CACHE~1.EXE PID 1832 wrote to memory of 1788 1832 _CACHE~1.EXE ._cache__CACHE~1.EXE PID 1832 wrote to memory of 1788 1832 _CACHE~1.EXE ._cache__CACHE~1.EXE PID 1788 wrote to memory of 1956 1788 ._cache__CACHE~1.EXE svchost.com PID 1788 wrote to memory of 1956 1788 ._cache__CACHE~1.EXE svchost.com PID 1788 wrote to memory of 1956 1788 ._cache__CACHE~1.EXE svchost.com PID 1788 wrote to memory of 1956 1788 ._cache__CACHE~1.EXE svchost.com PID 1956 wrote to memory of 1648 1956 svchost.com _CACHE~2.EXE PID 1956 wrote to memory of 1648 1956 svchost.com _CACHE~2.EXE PID 1956 wrote to memory of 1648 1956 svchost.com _CACHE~2.EXE PID 1956 wrote to memory of 1648 1956 svchost.com _CACHE~2.EXE PID 1648 wrote to memory of 1756 1648 _CACHE~2.EXE ._cache__CACHE~2.EXE PID 1648 wrote to memory of 1756 1648 _CACHE~2.EXE ._cache__CACHE~2.EXE PID 1648 wrote to memory of 1756 1648 _CACHE~2.EXE ._cache__CACHE~2.EXE PID 1648 wrote to memory of 1756 1648 _CACHE~2.EXE ._cache__CACHE~2.EXE PID 1756 wrote to memory of 1000 1756 ._cache__CACHE~2.EXE svchost.com PID 1756 wrote to memory of 1000 1756 ._cache__CACHE~2.EXE svchost.com PID 1756 wrote to memory of 1000 1756 ._cache__CACHE~2.EXE svchost.com PID 1756 wrote to memory of 1000 1756 ._cache__CACHE~2.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe"C:\Users\Admin\AppData\Local\Temp\a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe"C:\Users\Admin\AppData\Local\Temp\._cache_a89bc4b9bd1d8f77cbba8c0c6249cb0495b1b0bb3706a1c2be5f0c54cd4691dc.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"12⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE17⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"18⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"21⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"22⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE23⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"24⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"27⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE29⤵
- Executes dropped EXE
- Loads dropped DLL
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"30⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE"31⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE32⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"33⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"34⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE35⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"36⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE"37⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE38⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"40⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE41⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"42⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE"43⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE44⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"45⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"46⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE47⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"48⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE"49⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE50⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"51⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"52⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE53⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"54⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"55⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE56⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"57⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"58⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE59⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"60⤵
- Executes dropped EXE
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"61⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE62⤵
- Executes dropped EXE
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"64⤵
- Executes dropped EXE
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE65⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"66⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"67⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE68⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"69⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"70⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE71⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"72⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"73⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE74⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"75⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"76⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE77⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"78⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"79⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE80⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"81⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"82⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE83⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"84⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"85⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE86⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"87⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"88⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE89⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"90⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"91⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE92⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"93⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"94⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE95⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"96⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"97⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE98⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"99⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"100⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE101⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"102⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"103⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE104⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"105⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"106⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE107⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"108⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"109⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE110⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"111⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"112⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE113⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"114⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"115⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE116⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"117⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"118⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE119⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"120⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"121⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE122⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"123⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"124⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE125⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"126⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"127⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE128⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"129⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"130⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE131⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"132⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"133⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE134⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"135⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"136⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE137⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"138⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"139⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE140⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"141⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"142⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE143⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"144⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"145⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE146⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"147⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"148⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE149⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"150⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"151⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE152⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"153⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"154⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE155⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"156⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"157⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE158⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"159⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"160⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE161⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"162⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"163⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE164⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"165⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"166⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE167⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"168⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"169⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE170⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"171⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"172⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE173⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"174⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"175⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE176⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"177⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"178⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE179⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"180⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"181⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE182⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"183⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"184⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE185⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"186⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"187⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE188⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"189⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"190⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE191⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"192⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"193⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE194⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"195⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"196⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE197⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"198⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"199⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE200⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"201⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"202⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE203⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"204⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"205⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE206⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"207⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"208⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE209⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"210⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"211⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE212⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"213⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"214⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE215⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"216⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"217⤵
- Drops file in Windows directory
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE218⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"219⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"220⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE221⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"222⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"223⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE224⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"225⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"226⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE227⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"228⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"229⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE230⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"231⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"232⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE233⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"234⤵
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"235⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE236⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"237⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"238⤵
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE239⤵
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"240⤵
- Drops file in Windows directory
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"241⤵
- Drops file in Windows directory