Malware Analysis Report

2025-08-11 00:25

Sample ID 221001-wjyvwsaedj
Target c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550
SHA256 c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550
Tags
neshta persistence spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550

Threat Level: Known bad

The file c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550 was found to be: Known bad.

Malicious Activity Summary

neshta persistence spyware stealer

Modifies system executable filetype association

Neshta

Detect Neshta payload

Neshta family

Executes dropped EXE

Loads dropped DLL

Reads user/profile data of web browsers

Checks computer location settings

Drops file in Windows directory

Drops file in Program Files directory

Enumerates physical storage devices

Suspicious use of WriteProcessMemory

Suspicious behavior: GetForegroundWindowSpam

Modifies registry class

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-10-01 17:57

Signatures

Detect Neshta payload

Description Indicator Process Target
N/A N/A N/A N/A

Neshta family

neshta

Analysis: behavioral1

Detonation Overview

Submitted

2022-10-01 17:57

Reported

2022-10-01 18:09

Platform

win7-20220901-en

Max time kernel

152s

Max time network

48s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe"

Signatures

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A

Neshta

persistence spyware neshta

Reads user/profile data of web browsers

spyware stealer

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\DragDropHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rev C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32 C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open\command C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\WinRAR.exe\" \"%1\"" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rev\ = "WinRAR.REV" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR32 C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32 C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\WinRAR.exe,0" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\ = "RAR recovery volume" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\WinRAR.exe\" \"%1\"" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\WinRAR.exe,0" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open\command C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\ShellEx\DragDropHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\ = "WinRAR archive" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\ = "WinRAR ZIP archive" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\WinRAR.exe,1" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\WinRAR.exe\" \"%1\"" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe

"C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe"

C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe

"C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe"

Network

Country Destination Domain Proto
US 72.21.91.29:80 tcp

Files

memory/1028-54-0x0000000075111000-0x0000000075113000-memory.dmp

\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe

MD5 af2bbcac455f23fb916ba01bc2c7495f
SHA1 819a7fdf4b837a372d3cf58d35925439ca1eaa6b
SHA256 6180b5c055fd0d728b77ec580e03570c0df8c9196fd746e1c7aac23e6ce59bfb
SHA512 fae7ea3e8e08621b975e04dce925b92c26676155ef1c3636e56bf822d589d16a44d65d9fb304191d133417eef901bc308480afad124caab8aae5bd1c88d63920

memory/584-56-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe

MD5 af2bbcac455f23fb916ba01bc2c7495f
SHA1 819a7fdf4b837a372d3cf58d35925439ca1eaa6b
SHA256 6180b5c055fd0d728b77ec580e03570c0df8c9196fd746e1c7aac23e6ce59bfb
SHA512 fae7ea3e8e08621b975e04dce925b92c26676155ef1c3636e56bf822d589d16a44d65d9fb304191d133417eef901bc308480afad124caab8aae5bd1c88d63920

\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

MD5 9e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1 ec66cda99f44b62470c6930e5afda061579cde35
SHA256 8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA512 2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

Analysis: behavioral2

Detonation Overview

Submitted

2022-10-01 17:57

Reported

2022-10-01 18:11

Platform

win10v2004-20220812-en

Max time kernel

191s

Max time network

199s

Command Line

"C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe"

Signatures

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A

Neshta

persistence spyware neshta

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A

Reads user/profile data of web browsers

spyware stealer

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MI391D~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13165~1.21\MICROS~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MI9C33~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~4.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~3.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MIA062~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32 C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\ = "RAR recovery volume" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\WinRAR.exe,0" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\WinRAR.exe,1" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open\command C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\ = "WinRAR ZIP archive" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\WinRAR.exe\" \"%1\"" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\DragDropHandlers\WinRAR32 C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.rev C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\WinRAR.exe,0" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\WinRAR.exe\" \"%1\"" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\DropHandler\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open\command C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Folder\shellex\ContextMenuHandlers\WinRAR32 C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell\open\command\ = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\WinRAR.exe\" \"%1\"" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.rev\ = "WinRAR.REV" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open\command C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A

Suspicious behavior: GetForegroundWindowSpam

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe

"C:\Users\Admin\AppData\Local\Temp\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe"

C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe

"C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe"

Network

Country Destination Domain Proto
US 8.238.21.126:80 tcp
US 20.42.65.90:443 tcp
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
US 93.184.221.240:80 tcp
US 204.79.197.200:443 tcp
US 93.184.221.240:80 tcp

Files

C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe

MD5 af2bbcac455f23fb916ba01bc2c7495f
SHA1 819a7fdf4b837a372d3cf58d35925439ca1eaa6b
SHA256 6180b5c055fd0d728b77ec580e03570c0df8c9196fd746e1c7aac23e6ce59bfb
SHA512 fae7ea3e8e08621b975e04dce925b92c26676155ef1c3636e56bf822d589d16a44d65d9fb304191d133417eef901bc308480afad124caab8aae5bd1c88d63920

memory/1088-132-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\3582-490\c85aa9adecd42ed0db4c4bc6606e3d4c077639abb0a06c08216a04cf96880550.exe

MD5 af2bbcac455f23fb916ba01bc2c7495f
SHA1 819a7fdf4b837a372d3cf58d35925439ca1eaa6b
SHA256 6180b5c055fd0d728b77ec580e03570c0df8c9196fd746e1c7aac23e6ce59bfb
SHA512 fae7ea3e8e08621b975e04dce925b92c26676155ef1c3636e56bf822d589d16a44d65d9fb304191d133417eef901bc308480afad124caab8aae5bd1c88d63920