Analysis
-
max time kernel
140s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01-10-2022 17:57
Behavioral task
behavioral1
Sample
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe
Resource
win10v2004-20220901-en
General
-
Target
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe
-
Size
331KB
-
MD5
06a1ff466c12643060a9378cd51ca7c0
-
SHA1
d89c51b158fa2a67eaeb0111456292e6a6f73a89
-
SHA256
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316
-
SHA512
73b2c7a01e55d3b1df03b7f36c04f4cc1e233a180a4369cbb69f7ca73c5a00120b4230980b0fd9ab0cd4ac565bc6dff8194482dbb3b1e3d501a2362469b279d1
-
SSDEEP
6144:k9ZiIeqZUKRm1J0XhWqoDTUvaBMifp2BRvEmE9:UiIeNWiJ0XhWl0vKTiRvEm
Malware Config
Signatures
-
Detect Neshta payload 45 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\odt\OFFICE~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe family_neshta C:\Windows\svchost.com family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe family_neshta C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE family_neshta C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE family_neshta C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe family_neshta C:\PROGRA~2\Google\Update\DISABL~1.EXE family_neshta C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE family_neshta C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exesvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.compid process 4576 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe 4684 svchost.com 3596 FCFEA3~1.EXE 1036 svchost.com 32 FCFEA3~1.EXE 780 svchost.com 3996 FCFEA3~1.EXE 2728 svchost.com 2820 FCFEA3~1.EXE 2264 svchost.com 4776 FCFEA3~1.EXE 4300 svchost.com 2304 FCFEA3~1.EXE 3324 svchost.com 5108 FCFEA3~1.EXE 4948 svchost.com 3472 FCFEA3~1.EXE 2192 svchost.com 3132 FCFEA3~1.EXE 4584 svchost.com 4892 FCFEA3~1.EXE 4256 svchost.com 4580 FCFEA3~1.EXE 3016 svchost.com 2344 FCFEA3~1.EXE 3668 svchost.com 1320 FCFEA3~1.EXE 3436 svchost.com 3052 FCFEA3~1.EXE 3620 svchost.com 3580 FCFEA3~1.EXE 732 svchost.com 1776 FCFEA3~1.EXE 4876 svchost.com 2804 FCFEA3~1.EXE 3188 svchost.com 1700 FCFEA3~1.EXE 4684 svchost.com 3588 FCFEA3~1.EXE 220 svchost.com 4864 FCFEA3~1.EXE 228 svchost.com 3084 FCFEA3~1.EXE 4436 svchost.com 4752 FCFEA3~1.EXE 3852 svchost.com 2728 FCFEA3~1.EXE 1984 svchost.com 4812 FCFEA3~1.EXE 1396 svchost.com 3232 FCFEA3~1.EXE 2816 svchost.com 1588 FCFEA3~1.EXE 1340 svchost.com 1676 FCFEA3~1.EXE 3728 svchost.com 2380 FCFEA3~1.EXE 4904 svchost.com 4200 FCFEA3~1.EXE 2992 svchost.com 1836 FCFEA3~1.EXE 4116 svchost.com 2940 FCFEA3~1.EXE 1248 svchost.com -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
FCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEfcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation FCFEA3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exefcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exedescription ioc process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~3.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MIA062~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~2.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~4.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13167~1.21\MICROS~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13167~1.21\MICROS~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe -
Drops file in Windows directory 64 IoCs
Processes:
FCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEsvchost.comsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comsvchost.comsvchost.comFCFEA3~1.EXEFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comsvchost.comsvchost.comFCFEA3~1.EXEFCFEA3~1.EXEsvchost.comsvchost.comsvchost.comFCFEA3~1.EXEsvchost.comsvchost.comFCFEA3~1.EXEsvchost.comsvchost.comFCFEA3~1.EXEsvchost.comsvchost.comFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEsvchost.comsvchost.comFCFEA3~1.EXEFCFEA3~1.EXEsvchost.comsvchost.comsvchost.comFCFEA3~1.EXEsvchost.comsvchost.comFCFEA3~1.EXEsvchost.comsvchost.comFCFEA3~1.EXEsvchost.comsvchost.comFCFEA3~1.EXEsvchost.comsvchost.comsvchost.comdescription ioc process File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FCFEA3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
Processes:
FCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEFCFEA3~1.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D6589121-FC70-11D0-AC94-00C04FD97575}\ = "IAgentExt" FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B0913412-3B44-11D1-ACBA-00C04FD97575} FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93C91-7B81-11D0-AC5F-00C04FD97575}\TypeLib\ = "{A7B93C73-7B81-11D0-AC5F-00C04FD97575}" FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C80-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32 FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{98BBE491-2EED-11D1-ACAC-00C04FD97575} FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{00D18159-8466-11D0-AC63-00C04FD97575} FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Agent.Server.2\CLSID FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93C87-7B81-11D0-AC5F-00C04FD97575}\TypeLib FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C87-7B81-11D0-AC5F-00C04FD97575} FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C87-7B81-11D0-AC5F-00C04FD97575}\TypeLib\ = "{A7B93C73-7B81-11D0-AC5F-00C04FD97575}" FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93C89-7B81-11D0-AC5F-00C04FD97575}\TypeLib\ = "{A7B93C73-7B81-11D0-AC5F-00C04FD97575}" FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D0ECB23-9968-11D0-AC6E-00C04FD97575}\TypeLib\Version = "2.0" FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{D6589123-FC70-11D0-AC94-00C04FD97575}\2.0\0 FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C8F-7B81-11D0-AC5F-00C04FD97575}\TypeLib\Version = "2.0" FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{08C75162-3C9C-11D1-91FE-00C04FD701A5}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D45FD2FC-5C6E-11D1-9EC1-00C04FD7081F}\LocalServer32 FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93C87-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32 FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93C89-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93C8F-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{00D18159-8466-11D0-AC63-00C04FD97575}\ProxyStubClsid32 FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D6589121-FC70-11D0-AC94-00C04FD97575}\TypeLib\Version = "2.0" FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{A7B93C80-7B81-11D0-AC5F-00C04FD97575} FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C85-7B81-11D0-AC5F-00C04FD97575}\ = "IAgentCommands" FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93CA0-7B81-11D0-AC5F-00C04FD97575}\ = "IAgentAudioOutputPropertiesEx" FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{48D12BA0-5B77-11D1-9EC1-00C04FD7081F}\TypeLib\Version = "2.0" FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{A7B93C92-7B81-11D0-AC5F-00C04FD97575}\TreatAs FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C87-7B81-11D0-AC5F-00C04FD97575}\ProxyStubClsid32 FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{6D0ECB23-9968-11D0-AC6E-00C04FD97575}\TypeLib\ = "{A7B93C73-7B81-11D0-AC5F-00C04FD97575}" FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D6589121-FC70-11D0-AC94-00C04FD97575} FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F5BE8BC2-7DE6-11D0-91FE-00C04FD701A5}\1.5\0\win32 FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{F5BE8BC2-7DE6-11D0-91FE-00C04FD701A5}\1.5\FLAGS FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C83-7B81-11D0-AC5F-00C04FD97575} FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{D7A6D440-8872-11D1-9EC6-00C04FD7081F}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{A7B93C80-7B81-11D0-AC5F-00C04FD97575}\TypeLib\Version = "2.0" FCFEA3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{B0913412-3B44-11D1-ACBA-00C04FD97575}\TypeLib\Version = "2.0" FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{D7A6D440-8872-11D1-9EC6-00C04FD7081F}\TypeLib FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings FCFEA3~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{B0913412-3B44-11D1-ACBA-00C04FD97575}\TypeLib FCFEA3~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exefcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exesvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEsvchost.comFCFEA3~1.EXEdescription pid process target process PID 3276 wrote to memory of 4576 3276 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe PID 3276 wrote to memory of 4576 3276 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe PID 3276 wrote to memory of 4576 3276 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe PID 4576 wrote to memory of 4684 4576 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe svchost.com PID 4576 wrote to memory of 4684 4576 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe svchost.com PID 4576 wrote to memory of 4684 4576 fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe svchost.com PID 4684 wrote to memory of 3596 4684 svchost.com FCFEA3~1.EXE PID 4684 wrote to memory of 3596 4684 svchost.com FCFEA3~1.EXE PID 4684 wrote to memory of 3596 4684 svchost.com FCFEA3~1.EXE PID 3596 wrote to memory of 1036 3596 FCFEA3~1.EXE svchost.com PID 3596 wrote to memory of 1036 3596 FCFEA3~1.EXE svchost.com PID 3596 wrote to memory of 1036 3596 FCFEA3~1.EXE svchost.com PID 1036 wrote to memory of 32 1036 svchost.com FCFEA3~1.EXE PID 1036 wrote to memory of 32 1036 svchost.com FCFEA3~1.EXE PID 1036 wrote to memory of 32 1036 svchost.com FCFEA3~1.EXE PID 32 wrote to memory of 780 32 FCFEA3~1.EXE svchost.com PID 32 wrote to memory of 780 32 FCFEA3~1.EXE svchost.com PID 32 wrote to memory of 780 32 FCFEA3~1.EXE svchost.com PID 780 wrote to memory of 3996 780 svchost.com FCFEA3~1.EXE PID 780 wrote to memory of 3996 780 svchost.com FCFEA3~1.EXE PID 780 wrote to memory of 3996 780 svchost.com FCFEA3~1.EXE PID 3996 wrote to memory of 2728 3996 FCFEA3~1.EXE svchost.com PID 3996 wrote to memory of 2728 3996 FCFEA3~1.EXE svchost.com PID 3996 wrote to memory of 2728 3996 FCFEA3~1.EXE svchost.com PID 2728 wrote to memory of 2820 2728 svchost.com FCFEA3~1.EXE PID 2728 wrote to memory of 2820 2728 svchost.com FCFEA3~1.EXE PID 2728 wrote to memory of 2820 2728 svchost.com FCFEA3~1.EXE PID 2820 wrote to memory of 2264 2820 FCFEA3~1.EXE svchost.com PID 2820 wrote to memory of 2264 2820 FCFEA3~1.EXE svchost.com PID 2820 wrote to memory of 2264 2820 FCFEA3~1.EXE svchost.com PID 2264 wrote to memory of 4776 2264 svchost.com FCFEA3~1.EXE PID 2264 wrote to memory of 4776 2264 svchost.com FCFEA3~1.EXE PID 2264 wrote to memory of 4776 2264 svchost.com FCFEA3~1.EXE PID 4776 wrote to memory of 4300 4776 FCFEA3~1.EXE svchost.com PID 4776 wrote to memory of 4300 4776 FCFEA3~1.EXE svchost.com PID 4776 wrote to memory of 4300 4776 FCFEA3~1.EXE svchost.com PID 4300 wrote to memory of 2304 4300 svchost.com FCFEA3~1.EXE PID 4300 wrote to memory of 2304 4300 svchost.com FCFEA3~1.EXE PID 4300 wrote to memory of 2304 4300 svchost.com FCFEA3~1.EXE PID 2304 wrote to memory of 3324 2304 FCFEA3~1.EXE svchost.com PID 2304 wrote to memory of 3324 2304 FCFEA3~1.EXE svchost.com PID 2304 wrote to memory of 3324 2304 FCFEA3~1.EXE svchost.com PID 3324 wrote to memory of 5108 3324 svchost.com FCFEA3~1.EXE PID 3324 wrote to memory of 5108 3324 svchost.com FCFEA3~1.EXE PID 3324 wrote to memory of 5108 3324 svchost.com FCFEA3~1.EXE PID 5108 wrote to memory of 4948 5108 FCFEA3~1.EXE svchost.com PID 5108 wrote to memory of 4948 5108 FCFEA3~1.EXE svchost.com PID 5108 wrote to memory of 4948 5108 FCFEA3~1.EXE svchost.com PID 4948 wrote to memory of 3472 4948 svchost.com FCFEA3~1.EXE PID 4948 wrote to memory of 3472 4948 svchost.com FCFEA3~1.EXE PID 4948 wrote to memory of 3472 4948 svchost.com FCFEA3~1.EXE PID 3472 wrote to memory of 2192 3472 FCFEA3~1.EXE svchost.com PID 3472 wrote to memory of 2192 3472 FCFEA3~1.EXE svchost.com PID 3472 wrote to memory of 2192 3472 FCFEA3~1.EXE svchost.com PID 2192 wrote to memory of 3132 2192 svchost.com FCFEA3~1.EXE PID 2192 wrote to memory of 3132 2192 svchost.com FCFEA3~1.EXE PID 2192 wrote to memory of 3132 2192 svchost.com FCFEA3~1.EXE PID 3132 wrote to memory of 4584 3132 FCFEA3~1.EXE svchost.com PID 3132 wrote to memory of 4584 3132 FCFEA3~1.EXE svchost.com PID 3132 wrote to memory of 4584 3132 FCFEA3~1.EXE svchost.com PID 4584 wrote to memory of 4892 4584 svchost.com FCFEA3~1.EXE PID 4584 wrote to memory of 4892 4584 svchost.com FCFEA3~1.EXE PID 4584 wrote to memory of 4892 4584 svchost.com FCFEA3~1.EXE PID 4892 wrote to memory of 4256 4892 FCFEA3~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe"C:\Users\Admin\AppData\Local\Temp\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\fcfea317a0cb315cb6a99db1facb7f099a6f5966685835791848d63295471316.exe"2⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE8⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE10⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"11⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE22⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"23⤵
- Executes dropped EXE
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE24⤵
- Executes dropped EXE
PID:4580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"25⤵
- Executes dropped EXE
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE26⤵
- Executes dropped EXE
PID:2344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"27⤵
- Executes dropped EXE
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE28⤵
- Executes dropped EXE
PID:1320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"29⤵
- Executes dropped EXE
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE30⤵
- Executes dropped EXE
- Checks computer location settings
PID:3052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"31⤵
- Executes dropped EXE
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE32⤵
- Executes dropped EXE
- Checks computer location settings
PID:3580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"33⤵
- Executes dropped EXE
PID:732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE34⤵
- Executes dropped EXE
PID:1776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"35⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE36⤵
- Executes dropped EXE
PID:2804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"37⤵
- Executes dropped EXE
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE38⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"39⤵
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE40⤵
- Executes dropped EXE
PID:3588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"41⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE42⤵
- Executes dropped EXE
PID:4864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"43⤵
- Executes dropped EXE
PID:228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE44⤵
- Executes dropped EXE
- Modifies registry class
PID:3084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"45⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE46⤵
- Executes dropped EXE
- Checks computer location settings
PID:4752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"47⤵
- Executes dropped EXE
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE48⤵
- Executes dropped EXE
PID:2728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"49⤵
- Executes dropped EXE
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE50⤵
- Executes dropped EXE
- Checks computer location settings
PID:4812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"51⤵
- Executes dropped EXE
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE52⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3232 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"53⤵
- Executes dropped EXE
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE54⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"55⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"57⤵
- Executes dropped EXE
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE58⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"59⤵
- Executes dropped EXE
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE60⤵
- Executes dropped EXE
PID:4200 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"61⤵
- Executes dropped EXE
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE62⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
PID:1836 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"63⤵
- Executes dropped EXE
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE64⤵
- Executes dropped EXE
- Checks computer location settings
PID:2940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"65⤵
- Executes dropped EXE
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE66⤵PID:3476
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"67⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE68⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"69⤵
- Drops file in Windows directory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE70⤵PID:3436
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"71⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE72⤵
- Modifies registry class
PID:1368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"73⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE74⤵
- Checks computer location settings
PID:2804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"75⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE76⤵PID:4684
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"77⤵PID:776
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE78⤵PID:220
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"79⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE80⤵
- Checks computer location settings
PID:384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"81⤵PID:780
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE82⤵
- Checks computer location settings
PID:456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"83⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE84⤵PID:3608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"85⤵PID:4232
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE86⤵
- Modifies registry class
PID:4788 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"87⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE88⤵
- Checks computer location settings
PID:4516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"89⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE90⤵PID:4300
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"91⤵
- Drops file in Windows directory
PID:560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE92⤵PID:4224
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"93⤵PID:4828
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE94⤵
- Checks computer location settings
PID:2452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"95⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE96⤵PID:1316
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"97⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE98⤵PID:1012
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"99⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE100⤵PID:4296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"101⤵PID:4440
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE102⤵PID:4116
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"103⤵
- Drops file in Windows directory
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE104⤵
- Drops file in Windows directory
PID:736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"105⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE106⤵PID:3676
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"107⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE108⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"109⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE110⤵
- Modifies registry class
PID:3548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"111⤵PID:548
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE112⤵
- Checks computer location settings
PID:3268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"113⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE114⤵
- Checks computer location settings
PID:4876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"115⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE116⤵PID:3368
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"117⤵
- Drops file in Windows directory
PID:240 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE118⤵PID:3596
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"119⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE120⤵PID:3536
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE"121⤵PID:32
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FCFEA3~1.EXE122⤵
- Drops file in Windows directory
PID:2456
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-