Malware Analysis Report

2025-08-05 19:35

Sample ID 221013-z437wsedf5
Target febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba
SHA256 febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba
Tags
neshta sality backdoor evasion persistence spyware stealer trojan upx
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V6

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba

Threat Level: Known bad

The file febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba was found to be: Known bad.

Malicious Activity Summary

neshta sality backdoor evasion persistence spyware stealer trojan upx

UAC bypass

Detect Neshta payload

Sality

Modifies system executable filetype association

Windows security bypass

Neshta

Modifies firewall policy service

Neshta family

Executes dropped EXE

UPX packed file

Windows security modification

Checks computer location settings

Reads user/profile data of web browsers

Loads dropped DLL

Enumerates connected drives

Checks whether UAC is enabled

Drops autorun.inf file

Drops file in Windows directory

Drops file in Program Files directory

Enumerates physical storage devices

Suspicious use of AdjustPrivilegeToken

Modifies registry class

System policy modification

Suspicious use of WriteProcessMemory

Suspicious behavior: EnumeratesProcesses

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2022-10-13 21:17

Signatures

Detect Neshta payload

Description Indicator Process Target
N/A N/A N/A N/A

Neshta family

neshta

Analysis: behavioral1

Detonation Overview

Submitted

2022-10-13 21:17

Reported

2022-10-14 02:24

Platform

win7-20220812-en

Max time kernel

182s

Max time network

46s

Command Line

C:\Windows\Explorer.EXE

Signatures

Modifies firewall policy service

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Neshta

persistence spyware neshta

Sality

backdoor sality

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Reads user/profile data of web browsers

spyware stealer

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Drops autorun.inf file

Description Indicator Process Target
File opened for modification C:\autorun.inf C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\Windows\SYSTEM.INI C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1880 wrote to memory of 1224 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe
PID 1880 wrote to memory of 1224 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe
PID 1880 wrote to memory of 1224 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe
PID 1880 wrote to memory of 1224 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe
PID 1224 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhost.exe
PID 1224 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\Dwm.exe
PID 1224 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 1224 wrote to memory of 1880 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe
PID 1224 wrote to memory of 1880 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe
PID 1224 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhost.exe
PID 1224 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\Dwm.exe
PID 1224 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 1224 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhost.exe
PID 1224 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\Dwm.exe
PID 1224 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 1880 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhost.exe
PID 1880 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\Dwm.exe
PID 1880 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 1880 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhost.exe
PID 1880 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\Dwm.exe
PID 1880 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 1880 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhost.exe
PID 1880 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\Dwm.exe
PID 1880 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 1880 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhost.exe
PID 1880 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\Dwm.exe
PID 1880 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 1880 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhost.exe
PID 1880 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\Dwm.exe
PID 1880 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 1880 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhost.exe
PID 1880 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\Dwm.exe
PID 1880 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 1880 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhost.exe
PID 1880 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\Dwm.exe
PID 1880 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 1880 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhost.exe
PID 1880 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\Dwm.exe
PID 1880 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 1880 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhost.exe
PID 1880 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\Dwm.exe
PID 1880 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 1880 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhost.exe
PID 1880 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\Dwm.exe
PID 1880 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 1880 wrote to memory of 1136 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhost.exe
PID 1880 wrote to memory of 1232 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\Dwm.exe
PID 1880 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Processes

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Windows\system32\Dwm.exe

"C:\Windows\system32\Dwm.exe"

C:\Windows\system32\taskhost.exe

"taskhost.exe"

C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe

"C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe"

C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe

"C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe"

Network

N/A

Files

memory/1880-54-0x0000000075201000-0x0000000075203000-memory.dmp

\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe

MD5 6882df90ceffff0a133bd156d538fa8e
SHA1 864b2abe5d08c9a1fb24f35627ddb449ba7e2160
SHA256 8caab2cf18dd64db397915337ae22a6090f01cb5f6876af50e81d75185fc1fb1
SHA512 0d97c2cd0b5648f7f80cfff1415fe1a89d5eae6ce3bcf70b5a570c003e19e72716f1b56d0737d21de8c76aef057b5ca3ccdca7d4f961a1e82a132e152b16576a

memory/1224-57-0x0000000000000000-mapping.dmp

\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe

MD5 6882df90ceffff0a133bd156d538fa8e
SHA1 864b2abe5d08c9a1fb24f35627ddb449ba7e2160
SHA256 8caab2cf18dd64db397915337ae22a6090f01cb5f6876af50e81d75185fc1fb1
SHA512 0d97c2cd0b5648f7f80cfff1415fe1a89d5eae6ce3bcf70b5a570c003e19e72716f1b56d0737d21de8c76aef057b5ca3ccdca7d4f961a1e82a132e152b16576a

C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe

MD5 6882df90ceffff0a133bd156d538fa8e
SHA1 864b2abe5d08c9a1fb24f35627ddb449ba7e2160
SHA256 8caab2cf18dd64db397915337ae22a6090f01cb5f6876af50e81d75185fc1fb1
SHA512 0d97c2cd0b5648f7f80cfff1415fe1a89d5eae6ce3bcf70b5a570c003e19e72716f1b56d0737d21de8c76aef057b5ca3ccdca7d4f961a1e82a132e152b16576a

C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe

MD5 6882df90ceffff0a133bd156d538fa8e
SHA1 864b2abe5d08c9a1fb24f35627ddb449ba7e2160
SHA256 8caab2cf18dd64db397915337ae22a6090f01cb5f6876af50e81d75185fc1fb1
SHA512 0d97c2cd0b5648f7f80cfff1415fe1a89d5eae6ce3bcf70b5a570c003e19e72716f1b56d0737d21de8c76aef057b5ca3ccdca7d4f961a1e82a132e152b16576a

memory/1224-61-0x0000000002460000-0x00000000034EE000-memory.dmp

memory/1880-62-0x00000000025F0000-0x0000000002646000-memory.dmp

memory/1224-64-0x0000000001000000-0x0000000001056000-memory.dmp

memory/1880-63-0x00000000025F0000-0x0000000002646000-memory.dmp

memory/1224-65-0x0000000002460000-0x00000000034EE000-memory.dmp

memory/1880-67-0x00000000003C0000-0x00000000003C2000-memory.dmp

memory/1224-66-0x00000000004B0000-0x00000000004B2000-memory.dmp

\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

MD5 9e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1 ec66cda99f44b62470c6930e5afda061579cde35
SHA256 8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA512 2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

memory/1224-69-0x0000000002460000-0x00000000034EE000-memory.dmp

memory/1224-70-0x00000000004B0000-0x00000000004B2000-memory.dmp

memory/1224-71-0x0000000001000000-0x0000000001056000-memory.dmp

memory/1224-72-0x0000000002460000-0x00000000034EE000-memory.dmp

memory/1880-73-0x0000000002C50000-0x0000000003CDE000-memory.dmp

C:\Windows\SYSTEM.INI

MD5 99faf14f2b39f98a14b1e703edefe9ae
SHA1 484c5319197e8c1b7efb491053af8122f78a17f2
SHA256 42d4f407d5199cfa2119eb6efe31e4892010590bfc338920fcb4b08d946f100d
SHA512 50d99162b696a45221c3fa7e62c8028f4dc3293e8a29e8839fb2e135aa26dc5c8e962d655ebb5e7080dbd93bc5f29156bb0cbc881544257198da2848f2e0eac5

memory/1880-75-0x00000000023A0000-0x0000000002FEA000-memory.dmp

memory/1880-76-0x00000000023A0000-0x0000000002FEA000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\winkdmvp.exe

MD5 25aa9bb549ecc7bb6100f8d179452508
SHA1 a3bea5e2138d1558109fa26d46e2f79c3a20228f
SHA256 df83a0d6940600e4c4954f4874fcd4dd73e781e6690c3bf56f51c95285484a3c
SHA512 12e26fa999faf2ca017a49987be5c668930495c26c789e19863097e5b0555add90ecdbb397521436acb47d7f2dfd5029b9b4beed16877ac7df854b3321642e37

memory/1880-78-0x00000000025F0000-0x0000000002646000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2022-10-13 21:17

Reported

2022-10-14 02:24

Platform

win10v2004-20220901-en

Max time kernel

146s

Max time network

151s

Command Line

"fontdrvhost.exe"

Signatures

Detect Neshta payload

Description Indicator Process Target
N/A N/A N/A N/A

Modifies firewall policy service

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Neshta

persistence spyware neshta

Sality

backdoor sality

UAC bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Windows security bypass

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

UPX packed file

upx
Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Reads user/profile data of web browsers

spyware stealer

Windows security modification

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Checks whether UAC is enabled

evasion trojan
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Enumerates connected drives

Description Indicator Process Target
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\X: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\Q: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\G: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\E: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\U: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\Y: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\O: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\S: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\R: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\V: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\Z: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\M: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\P: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\T: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\F: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\J: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\W: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\K: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\N: C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\I: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\H: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened (read-only) \??\L: C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Drops autorun.inf file

Description Indicator Process Target
File opened for modification C:\autorun.inf C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeClickToRun.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\Uninstall.exe C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRAM FILES\ClearConfirm.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MI391D~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~2.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13167~1.21\MICROS~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\IntegratedOffice.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MIA062~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13167~1.21\MICROS~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\MavInject32.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\CLICKTORUN\OfficeC2RClient.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\7z.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRAM FILES\7-ZIP\7zFM.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
File opened for modification C:\Windows\SYSTEM.INI C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Suspicious use of AdjustPrivilegeToken

Description Indicator Process Target
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Token: SeDebugPrivilege N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2116 wrote to memory of 2716 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe
PID 2116 wrote to memory of 2716 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe
PID 2116 wrote to memory of 2716 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe
PID 2716 wrote to memory of 772 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\fontdrvhost.exe
PID 2716 wrote to memory of 780 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\fontdrvhost.exe
PID 2716 wrote to memory of 1020 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\dwm.exe
PID 2716 wrote to memory of 2340 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\sihost.exe
PID 2716 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\svchost.exe
PID 2716 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhostw.exe
PID 2716 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 2716 wrote to memory of 760 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\svchost.exe
PID 2716 wrote to memory of 3244 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\DllHost.exe
PID 2716 wrote to memory of 3332 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
PID 2716 wrote to memory of 3396 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\System32\RuntimeBroker.exe
PID 2716 wrote to memory of 3496 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
PID 2716 wrote to memory of 3616 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\System32\RuntimeBroker.exe
PID 2716 wrote to memory of 4692 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\System32\RuntimeBroker.exe
PID 2716 wrote to memory of 740 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\backgroundTaskHost.exe
PID 2716 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\System32\RuntimeBroker.exe
PID 2716 wrote to memory of 2848 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\backgroundTaskHost.exe
PID 2716 wrote to memory of 2116 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe
PID 2716 wrote to memory of 2116 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe
PID 2716 wrote to memory of 772 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\fontdrvhost.exe
PID 2716 wrote to memory of 780 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\fontdrvhost.exe
PID 2716 wrote to memory of 1020 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\dwm.exe
PID 2716 wrote to memory of 2340 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\sihost.exe
PID 2716 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\svchost.exe
PID 2716 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhostw.exe
PID 2716 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 2716 wrote to memory of 760 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\svchost.exe
PID 2716 wrote to memory of 3244 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\DllHost.exe
PID 2716 wrote to memory of 3332 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
PID 2716 wrote to memory of 3396 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\System32\RuntimeBroker.exe
PID 2716 wrote to memory of 3496 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
PID 2716 wrote to memory of 3616 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\System32\RuntimeBroker.exe
PID 2716 wrote to memory of 4692 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\System32\RuntimeBroker.exe
PID 2716 wrote to memory of 740 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\backgroundTaskHost.exe
PID 2716 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\System32\RuntimeBroker.exe
PID 2716 wrote to memory of 772 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\fontdrvhost.exe
PID 2716 wrote to memory of 780 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\fontdrvhost.exe
PID 2716 wrote to memory of 1020 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\dwm.exe
PID 2716 wrote to memory of 2340 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\sihost.exe
PID 2716 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\svchost.exe
PID 2716 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhostw.exe
PID 2716 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 2716 wrote to memory of 760 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\svchost.exe
PID 2716 wrote to memory of 3244 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\DllHost.exe
PID 2116 wrote to memory of 772 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\fontdrvhost.exe
PID 2116 wrote to memory of 780 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\fontdrvhost.exe
PID 2116 wrote to memory of 1020 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\dwm.exe
PID 2116 wrote to memory of 2340 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\sihost.exe
PID 2116 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\svchost.exe
PID 2116 wrote to memory of 2496 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\taskhostw.exe
PID 2116 wrote to memory of 2940 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\Explorer.EXE
PID 2116 wrote to memory of 760 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\svchost.exe
PID 2116 wrote to memory of 3244 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\DllHost.exe
PID 2116 wrote to memory of 3332 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe
PID 2116 wrote to memory of 3396 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\System32\RuntimeBroker.exe
PID 2116 wrote to memory of 3496 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe
PID 2116 wrote to memory of 3616 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\System32\RuntimeBroker.exe
PID 2116 wrote to memory of 4692 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\System32\RuntimeBroker.exe
PID 2116 wrote to memory of 740 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\backgroundTaskHost.exe
PID 2116 wrote to memory of 2588 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\System32\RuntimeBroker.exe
PID 2116 wrote to memory of 772 N/A C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe C:\Windows\system32\fontdrvhost.exe

System policy modification

evasion
Description Indicator Process Target
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A
Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe N/A

Processes

C:\Windows\system32\fontdrvhost.exe

"fontdrvhost.exe"

C:\Windows\system32\dwm.exe

"dwm.exe"

C:\Windows\system32\fontdrvhost.exe

"fontdrvhost.exe"

C:\Windows\system32\sihost.exe

sihost.exe

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc

C:\Windows\system32\backgroundTaskHost.exe

"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca

C:\Windows\system32\backgroundTaskHost.exe

"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe

"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca

C:\Windows\System32\RuntimeBroker.exe

C:\Windows\System32\RuntimeBroker.exe -Embedding

C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe

"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca

C:\Windows\system32\DllHost.exe

C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}

C:\Windows\system32\svchost.exe

C:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc

C:\Windows\Explorer.EXE

C:\Windows\Explorer.EXE

C:\Windows\system32\taskhostw.exe

taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}

C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe

"C:\Users\Admin\AppData\Local\Temp\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe"

C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe

"C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe"

Network

Country Destination Domain Proto
US 93.184.220.29:80 tcp
US 20.42.73.24:443 tcp
NL 178.79.208.1:80 tcp
NL 104.80.225.205:443 tcp

Files

memory/2716-132-0x0000000000000000-mapping.dmp

C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe

MD5 6882df90ceffff0a133bd156d538fa8e
SHA1 864b2abe5d08c9a1fb24f35627ddb449ba7e2160
SHA256 8caab2cf18dd64db397915337ae22a6090f01cb5f6876af50e81d75185fc1fb1
SHA512 0d97c2cd0b5648f7f80cfff1415fe1a89d5eae6ce3bcf70b5a570c003e19e72716f1b56d0737d21de8c76aef057b5ca3ccdca7d4f961a1e82a132e152b16576a

C:\Users\Admin\AppData\Local\Temp\3582-490\febfcff60f563c1de8722695bdcedfa299063cc59c17dd34d2bc13262fc54bba.exe

MD5 6882df90ceffff0a133bd156d538fa8e
SHA1 864b2abe5d08c9a1fb24f35627ddb449ba7e2160
SHA256 8caab2cf18dd64db397915337ae22a6090f01cb5f6876af50e81d75185fc1fb1
SHA512 0d97c2cd0b5648f7f80cfff1415fe1a89d5eae6ce3bcf70b5a570c003e19e72716f1b56d0737d21de8c76aef057b5ca3ccdca7d4f961a1e82a132e152b16576a

memory/2716-136-0x0000000001000000-0x0000000001056000-memory.dmp

memory/2716-135-0x0000000002470000-0x00000000034FE000-memory.dmp

memory/2716-137-0x0000000002470000-0x00000000034FE000-memory.dmp

C:\ODT\office2016setup.exe

MD5 02c3d242fe142b0eabec69211b34bc55
SHA1 ea0a4a6d6078b362f7b3a4ad1505ce49957dc16e
SHA256 2a1ed24be7e3859b46ec3ebc316789ead5f12055853f86a9656e04b4bb771842
SHA512 0efb08492eaaa2e923beddc21566e98fbbef3a102f9415ff310ec616f5c84fd2ba3a7025b05e01c0bdf37e5e2f64dfd845f9254a376144cc7d827e7577dbb099

memory/2716-139-0x0000000001000000-0x0000000001056000-memory.dmp

memory/2716-140-0x0000000002470000-0x00000000034FE000-memory.dmp

C:\Windows\SYSTEM.INI

MD5 e4ac472fc8a3d2dd30f83efcb5b013bd
SHA1 2a6004ba8cd7082f78c81afaf490deb6e326399a
SHA256 710829c10cec3b6925b41b2f64e4dda7dc4d06fbd566dc8ce3aa35a7a5fc80b7
SHA512 9b99604be39d212fa02f26c7230299f151c26d905064e4627cdbe937d9038184471b1ca61e72adb73ae19379a5237a5bf06321d3cb3c3d0128429851cdc91395

memory/2116-142-0x0000000003530000-0x00000000045BE000-memory.dmp

memory/2116-143-0x0000000003530000-0x00000000045BE000-memory.dmp

memory/2116-144-0x0000000003530000-0x00000000045BE000-memory.dmp