Analysis
-
max time kernel
160s -
max time network
182s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2022 18:11
Behavioral task
behavioral1
Sample
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe
Resource
win10v2004-20220812-en
General
-
Target
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe
-
Size
229KB
-
MD5
cd9fcba13ff275e595128ac7d01dd3c2
-
SHA1
f841a0b9f8578e9d901555de9049b1609a307e4f
-
SHA256
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d
-
SHA512
2aa1ef6d116da763fbc3c148808450f415b1189f005255d7db235c5fae6f4e1c3ad10286fb0a2b4e27955714b8560815a231d5a8ebe9cf1fd798555a88a94f8b
-
SSDEEP
6144:k9TDEgno7nzQr8Etlt4WypQtNq2vdUZ9vExlCNxbiVc7We5OdoIgnJbXeae/W5Bd:KDEgnoh7DOdoImxX7apIMGvb
Malware Config
Signatures
-
Detect Neshta payload 35 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\odt\OFFICE~1.EXE family_neshta C:\Windows\svchost.com family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe family_neshta C:\Windows\svchost.com family_neshta -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exesvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.compid process 5048 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 5004 svchost.com 4924 95D8EC~1.EXE 2032 svchost.com 1360 95D8EC~1.EXE 3008 svchost.com 2700 95D8EC~1.EXE 5116 svchost.com 4076 95D8EC~1.EXE 4936 svchost.com 1568 95D8EC~1.EXE 212 svchost.com 628 95D8EC~1.EXE 4420 svchost.com 4588 95D8EC~1.EXE 3452 svchost.com 4592 95D8EC~1.EXE 3908 svchost.com 1276 95D8EC~1.EXE 3448 svchost.com 1880 95D8EC~1.EXE 2208 svchost.com 3168 95D8EC~1.EXE 3732 svchost.com 4140 95D8EC~1.EXE 1032 svchost.com 2852 95D8EC~1.EXE 4596 svchost.com 1480 95D8EC~1.EXE 1728 svchost.com 1148 95D8EC~1.EXE 1424 svchost.com 2024 95D8EC~1.EXE 5100 svchost.com 2088 95D8EC~1.EXE 4820 svchost.com 860 95D8EC~1.EXE 4736 svchost.com 3300 95D8EC~1.EXE 2956 svchost.com 2564 95D8EC~1.EXE 4860 svchost.com 4988 95D8EC~1.EXE 1488 svchost.com 3588 95D8EC~1.EXE 2580 svchost.com 3980 95D8EC~1.EXE 5032 svchost.com 1736 95D8EC~1.EXE 1696 svchost.com 4952 95D8EC~1.EXE 1380 svchost.com 4360 95D8EC~1.EXE 3008 svchost.com 1340 95D8EC~1.EXE 5116 svchost.com 1068 95D8EC~1.EXE 1884 svchost.com 3952 95D8EC~1.EXE 1236 svchost.com 4324 95D8EC~1.EXE 564 svchost.com 212 95D8EC~1.EXE 628 svchost.com -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXEdescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation 95D8EC~1.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exedescription ioc process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~3.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~2.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MI9C33~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MICROS~4.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13165~1.21\MICROS~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MIA062~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13165~1.21\MI391D~1.EXE 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe -
Drops file in Windows directory 64 IoCs
Processes:
95D8EC~1.EXEsvchost.com95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.comsvchost.com95D8EC~1.EXEsvchost.comsvchost.com95D8EC~1.EXEsvchost.comsvchost.com95D8EC~1.EXEsvchost.comsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXEsvchost.comsvchost.com95D8EC~1.EXE95D8EC~1.EXEsvchost.comsvchost.com95D8EC~1.EXE95D8EC~1.EXEsvchost.comsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEdescription ioc process File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 95D8EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 95D8EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 64 IoCs
Processes:
95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXE95D8EC~1.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000_Classes\Local Settings 95D8EC~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exesvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEsvchost.com95D8EC~1.EXEdescription pid process target process PID 4656 wrote to memory of 5048 4656 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe PID 4656 wrote to memory of 5048 4656 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe PID 4656 wrote to memory of 5048 4656 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe PID 5048 wrote to memory of 5004 5048 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe svchost.com PID 5048 wrote to memory of 5004 5048 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe svchost.com PID 5048 wrote to memory of 5004 5048 95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe svchost.com PID 5004 wrote to memory of 4924 5004 svchost.com 95D8EC~1.EXE PID 5004 wrote to memory of 4924 5004 svchost.com 95D8EC~1.EXE PID 5004 wrote to memory of 4924 5004 svchost.com 95D8EC~1.EXE PID 4924 wrote to memory of 2032 4924 95D8EC~1.EXE svchost.com PID 4924 wrote to memory of 2032 4924 95D8EC~1.EXE svchost.com PID 4924 wrote to memory of 2032 4924 95D8EC~1.EXE svchost.com PID 2032 wrote to memory of 1360 2032 svchost.com 95D8EC~1.EXE PID 2032 wrote to memory of 1360 2032 svchost.com 95D8EC~1.EXE PID 2032 wrote to memory of 1360 2032 svchost.com 95D8EC~1.EXE PID 1360 wrote to memory of 3008 1360 95D8EC~1.EXE svchost.com PID 1360 wrote to memory of 3008 1360 95D8EC~1.EXE svchost.com PID 1360 wrote to memory of 3008 1360 95D8EC~1.EXE svchost.com PID 3008 wrote to memory of 2700 3008 svchost.com 95D8EC~1.EXE PID 3008 wrote to memory of 2700 3008 svchost.com 95D8EC~1.EXE PID 3008 wrote to memory of 2700 3008 svchost.com 95D8EC~1.EXE PID 2700 wrote to memory of 5116 2700 95D8EC~1.EXE svchost.com PID 2700 wrote to memory of 5116 2700 95D8EC~1.EXE svchost.com PID 2700 wrote to memory of 5116 2700 95D8EC~1.EXE svchost.com PID 5116 wrote to memory of 4076 5116 svchost.com 95D8EC~1.EXE PID 5116 wrote to memory of 4076 5116 svchost.com 95D8EC~1.EXE PID 5116 wrote to memory of 4076 5116 svchost.com 95D8EC~1.EXE PID 4076 wrote to memory of 4936 4076 95D8EC~1.EXE svchost.com PID 4076 wrote to memory of 4936 4076 95D8EC~1.EXE svchost.com PID 4076 wrote to memory of 4936 4076 95D8EC~1.EXE svchost.com PID 4936 wrote to memory of 1568 4936 svchost.com 95D8EC~1.EXE PID 4936 wrote to memory of 1568 4936 svchost.com 95D8EC~1.EXE PID 4936 wrote to memory of 1568 4936 svchost.com 95D8EC~1.EXE PID 1568 wrote to memory of 212 1568 95D8EC~1.EXE svchost.com PID 1568 wrote to memory of 212 1568 95D8EC~1.EXE svchost.com PID 1568 wrote to memory of 212 1568 95D8EC~1.EXE svchost.com PID 212 wrote to memory of 628 212 svchost.com 95D8EC~1.EXE PID 212 wrote to memory of 628 212 svchost.com 95D8EC~1.EXE PID 212 wrote to memory of 628 212 svchost.com 95D8EC~1.EXE PID 628 wrote to memory of 4420 628 95D8EC~1.EXE svchost.com PID 628 wrote to memory of 4420 628 95D8EC~1.EXE svchost.com PID 628 wrote to memory of 4420 628 95D8EC~1.EXE svchost.com PID 4420 wrote to memory of 4588 4420 svchost.com 95D8EC~1.EXE PID 4420 wrote to memory of 4588 4420 svchost.com 95D8EC~1.EXE PID 4420 wrote to memory of 4588 4420 svchost.com 95D8EC~1.EXE PID 4588 wrote to memory of 3452 4588 95D8EC~1.EXE svchost.com PID 4588 wrote to memory of 3452 4588 95D8EC~1.EXE svchost.com PID 4588 wrote to memory of 3452 4588 95D8EC~1.EXE svchost.com PID 3452 wrote to memory of 4592 3452 svchost.com 95D8EC~1.EXE PID 3452 wrote to memory of 4592 3452 svchost.com 95D8EC~1.EXE PID 3452 wrote to memory of 4592 3452 svchost.com 95D8EC~1.EXE PID 4592 wrote to memory of 3908 4592 95D8EC~1.EXE svchost.com PID 4592 wrote to memory of 3908 4592 95D8EC~1.EXE svchost.com PID 4592 wrote to memory of 3908 4592 95D8EC~1.EXE svchost.com PID 3908 wrote to memory of 1276 3908 svchost.com 95D8EC~1.EXE PID 3908 wrote to memory of 1276 3908 svchost.com 95D8EC~1.EXE PID 3908 wrote to memory of 1276 3908 svchost.com 95D8EC~1.EXE PID 1276 wrote to memory of 3448 1276 95D8EC~1.EXE svchost.com PID 1276 wrote to memory of 3448 1276 95D8EC~1.EXE svchost.com PID 1276 wrote to memory of 3448 1276 95D8EC~1.EXE svchost.com PID 3448 wrote to memory of 1880 3448 svchost.com 95D8EC~1.EXE PID 3448 wrote to memory of 1880 3448 svchost.com 95D8EC~1.EXE PID 3448 wrote to memory of 1880 3448 svchost.com 95D8EC~1.EXE PID 1880 wrote to memory of 2208 1880 95D8EC~1.EXE svchost.com
Processes
-
C:\Users\Admin\AppData\Local\Temp\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe"C:\Users\Admin\AppData\Local\Temp\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\95d8ec183c019823d13ea57e18c1dc9bd3f08faeae25c0f43c3e763daba6af1d.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE6⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE8⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE12⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE14⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"15⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE16⤵
- Executes dropped EXE
- Checks computer location settings
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE18⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE20⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE22⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"23⤵
- Executes dropped EXE
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE24⤵
- Executes dropped EXE
PID:3168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"25⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE26⤵
- Executes dropped EXE
- Modifies registry class
PID:4140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"27⤵
- Executes dropped EXE
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE28⤵
- Executes dropped EXE
- Checks computer location settings
PID:2852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"29⤵
- Executes dropped EXE
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE30⤵
- Executes dropped EXE
PID:1480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"31⤵
- Executes dropped EXE
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE32⤵
- Executes dropped EXE
- Modifies registry class
PID:1148 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"33⤵
- Executes dropped EXE
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE34⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"35⤵
- Executes dropped EXE
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE36⤵
- Executes dropped EXE
- Modifies registry class
PID:2088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"37⤵
- Executes dropped EXE
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE38⤵
- Executes dropped EXE
- Checks computer location settings
PID:860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4736 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE40⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3300 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"41⤵
- Executes dropped EXE
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE42⤵
- Executes dropped EXE
- Checks computer location settings
PID:2564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"43⤵
- Executes dropped EXE
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE44⤵
- Executes dropped EXE
PID:4988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"45⤵
- Executes dropped EXE
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE46⤵
- Executes dropped EXE
- Checks computer location settings
PID:3588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"47⤵
- Executes dropped EXE
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE48⤵
- Executes dropped EXE
- Checks computer location settings
PID:3980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"49⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE50⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"51⤵
- Executes dropped EXE
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE52⤵
- Executes dropped EXE
PID:4952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"53⤵
- Executes dropped EXE
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE54⤵
- Executes dropped EXE
PID:4360 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"55⤵
- Executes dropped EXE
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE56⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:1340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"57⤵
- Executes dropped EXE
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE58⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:1068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"59⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE60⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"61⤵
- Executes dropped EXE
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE62⤵
- Executes dropped EXE
- Checks computer location settings
- Modifies registry class
PID:4324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"63⤵
- Executes dropped EXE
PID:564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE64⤵
- Executes dropped EXE
- Checks computer location settings
PID:212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"65⤵
- Executes dropped EXE
PID:628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE66⤵PID:4664
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"67⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE68⤵
- Drops file in Windows directory
- Modifies registry class
PID:964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"69⤵
- Drops file in Windows directory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE70⤵
- Modifies registry class
PID:484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"71⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE72⤵
- Checks computer location settings
- Modifies registry class
PID:2672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"73⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE74⤵
- Modifies registry class
PID:8 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"75⤵
- Drops file in Windows directory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE76⤵PID:60
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"77⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE78⤵
- Modifies registry class
PID:3196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"79⤵PID:424
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE80⤵
- Checks computer location settings
PID:1976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"81⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE82⤵
- Checks computer location settings
PID:2752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"83⤵PID:4688
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE84⤵
- Checks computer location settings
- Modifies registry class
PID:1032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"85⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE86⤵PID:2968
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"87⤵PID:4084
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE88⤵
- Drops file in Windows directory
- Modifies registry class
PID:1864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"89⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE90⤵
- Drops file in Windows directory
PID:3712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"91⤵PID:3176
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE92⤵
- Modifies registry class
PID:2816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"93⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE94⤵PID:1892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"95⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE96⤵PID:2088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"97⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE98⤵PID:2632
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"99⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE100⤵
- Checks computer location settings
PID:1840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"101⤵
- Drops file in Windows directory
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE102⤵
- Checks computer location settings
PID:1288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"103⤵PID:4840
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE104⤵
- Checks computer location settings
- Modifies registry class
PID:3928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"105⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE106⤵PID:3524
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"107⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE108⤵
- Checks computer location settings
- Modifies registry class
PID:5056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"109⤵PID:5112
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE110⤵
- Checks computer location settings
PID:880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"111⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE112⤵PID:1908
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"113⤵PID:1088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE114⤵
- Checks computer location settings
PID:2636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"115⤵PID:2164
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE116⤵
- Modifies registry class
PID:2600 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"117⤵PID:1448
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE118⤵
- Checks computer location settings
- Modifies registry class
PID:1048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"119⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE120⤵
- Modifies registry class
PID:4076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE"121⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\95D8EC~1.EXE122⤵
- Checks computer location settings
PID:1884
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-