Analysis
-
max time kernel
61s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2023 19:43
Behavioral task
behavioral1
Sample
b5c217dec6b5572652a097fdaa836700_exe32.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b5c217dec6b5572652a097fdaa836700_exe32.exe
Resource
win10v2004-20230915-en
General
-
Target
b5c217dec6b5572652a097fdaa836700_exe32.exe
-
Size
127KB
-
MD5
b5c217dec6b5572652a097fdaa836700
-
SHA1
ac1aed1e8ce10b5cc407f213b612b3a575a48c5c
-
SHA256
a9f25d8e086b0a83ac4be5c2a404cff535e2ed8b723c9005b64b8f768941ccd6
-
SHA512
133d2e34b05051dd837f0bc4aae41604c2c6f0c6944c912e6533e9a4dea490716965ff24a3c9db2f830316634217e277ed8087c87168d583e212358babbb0953
-
SSDEEP
1536:JxqjQ+P04wsmJCEWN/do8pbaW2OWb2GqtE4OxqjQ+P04wsmJC:sr85CRN/do8pbld+ar85C
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x00070000000231f4-4.dat family_neshta behavioral2/files/0x00070000000231f4-7.dat family_neshta behavioral2/files/0x00070000000231f4-8.dat family_neshta behavioral2/files/0x0009000000023115-11.dat family_neshta behavioral2/files/0x0009000000023115-12.dat family_neshta behavioral2/files/0x00040000000162e7-13.dat family_neshta behavioral2/files/0x00070000000231f4-17.dat family_neshta behavioral2/memory/3312-18-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0009000000023115-19.dat family_neshta behavioral2/files/0x00070000000231f4-28.dat family_neshta behavioral2/memory/2216-29-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3332-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0009000000023115-31.dat family_neshta behavioral2/memory/312-34-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00070000000231f4-41.dat family_neshta behavioral2/memory/952-42-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0009000000023115-43.dat family_neshta behavioral2/memory/3848-46-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00070000000231f4-53.dat family_neshta behavioral2/memory/1104-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3328-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0009000000023115-55.dat family_neshta behavioral2/files/0x00070000000231f4-65.dat family_neshta behavioral2/memory/2016-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5072-70-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0009000000023115-67.dat family_neshta behavioral2/files/0x00070000000231f4-77.dat family_neshta behavioral2/memory/4860-78-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/936-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00070000000231f4-89.dat family_neshta behavioral2/files/0x0009000000023115-79.dat family_neshta behavioral2/memory/1312-90-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0009000000023115-91.dat family_neshta behavioral2/memory/2160-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00070000000231f4-101.dat family_neshta behavioral2/memory/1592-102-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3004-113-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00070000000231f4-112.dat family_neshta behavioral2/files/0x0009000000023115-103.dat family_neshta behavioral2/memory/4292-114-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0009000000023115-115.dat family_neshta behavioral2/files/0x00070000000231f4-120.dat family_neshta behavioral2/memory/4416-121-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2316-122-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0009000000023115-123.dat family_neshta behavioral2/memory/2664-126-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00070000000231f4-133.dat family_neshta behavioral2/memory/4456-134-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0009000000023115-135.dat family_neshta behavioral2/memory/4924-143-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00070000000231f4-145.dat family_neshta behavioral2/memory/2468-146-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00070000000231f4-157.dat family_neshta behavioral2/memory/1916-150-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0009000000023115-147.dat family_neshta behavioral2/memory/3240-158-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2556-162-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0009000000023115-159.dat family_neshta behavioral2/files/0x00070000000231f4-163.dat family_neshta behavioral2/memory/1488-164-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0009000000023115-167.dat family_neshta behavioral2/memory/4036-168-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00070000000231f4-175.dat family_neshta behavioral2/memory/1492-176-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation b5c217dec6b5572652a097fdaa836700_exe32.exe Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation svchost.com Key value queried \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000\Control Panel\International\Geo\Nation B5C217~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 2820 b5c217dec6b5572652a097fdaa836700_exe32.exe 3312 svchost.com 2216 B5C217~1.EXE 3332 svchost.com 312 B5C217~1.EXE 952 svchost.com 3848 B5C217~1.EXE 1104 svchost.com 3328 B5C217~1.EXE 2016 svchost.exe 5072 B5C217~1.EXE 4860 svchost.com 936 B5C217~1.EXE 1312 svchost.com 2160 B5C217~1.EXE 1592 svchost.com 3004 B5C217~1.EXE 4292 svchost.com 4416 B5C217~1.EXE 2316 svchost.com 2664 B5C217~1.EXE 4456 svchost.com 4924 B5C217~1.EXE 2468 svchost.com 1916 B5C217~1.EXE 3240 svchost.com 2556 B5C217~1.EXE 1488 svchost.com 4036 B5C217~1.EXE 1492 svchost.com 4584 B5C217~1.EXE 4380 svchost.com 4764 svchost.com 4964 svchost.com 5004 B5C217~1.EXE 2560 svchost.com 3592 B5C217~1.EXE 4108 svchost.com 1112 B5C217~1.EXE 396 svchost.com 4608 svchost.com 4996 svchost.com 1244 B5C217~1.EXE 2412 svchost.com 932 B5C217~1.EXE 4328 B5C217~1.EXE 216 B5C217~1.EXE 2468 svchost.com 3316 B5C217~1.EXE 4472 svchost.com 4196 B5C217~1.EXE 752 svchost.com 4100 B5C217~1.EXE 4644 svchost.com 1080 B5C217~1.EXE 4260 svchost.com 2040 B5C217~1.EXE 4764 svchost.com 3672 svchost.com 2576 svchost.com 2552 B5C217~1.EXE 3192 svchost.com 3880 svchost.exe 3792 B5C217~1.EXE -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" b5c217dec6b5572652a097fdaa836700_exe32.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13177~1.11\MICROS~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Install\{357BC~1\MicrosoftEdgeUpdateSetup_X86_1.3.177.11.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13177~1.11\MICROS~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe b5c217dec6b5572652a097fdaa836700_exe32.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com b5c217dec6b5572652a097fdaa836700_exe32.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\directx.sys svchost.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B5C217~1.EXE File opened for modification C:\Windows\svchost.com B5C217~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings b5c217dec6b5572652a097fdaa836700_exe32.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings svchost.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" b5c217dec6b5572652a097fdaa836700_exe32.exe Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings svchost.com Key created \REGISTRY\USER\S-1-5-21-3027552071-446050021-1254071215-1000_Classes\Local Settings B5C217~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2820 2544 b5c217dec6b5572652a097fdaa836700_exe32.exe 83 PID 2544 wrote to memory of 2820 2544 b5c217dec6b5572652a097fdaa836700_exe32.exe 83 PID 2544 wrote to memory of 2820 2544 b5c217dec6b5572652a097fdaa836700_exe32.exe 83 PID 2820 wrote to memory of 3312 2820 b5c217dec6b5572652a097fdaa836700_exe32.exe 84 PID 2820 wrote to memory of 3312 2820 b5c217dec6b5572652a097fdaa836700_exe32.exe 84 PID 2820 wrote to memory of 3312 2820 b5c217dec6b5572652a097fdaa836700_exe32.exe 84 PID 3312 wrote to memory of 2216 3312 svchost.com 85 PID 3312 wrote to memory of 2216 3312 svchost.com 85 PID 3312 wrote to memory of 2216 3312 svchost.com 85 PID 2216 wrote to memory of 3332 2216 B5C217~1.EXE 86 PID 2216 wrote to memory of 3332 2216 B5C217~1.EXE 86 PID 2216 wrote to memory of 3332 2216 B5C217~1.EXE 86 PID 3332 wrote to memory of 312 3332 svchost.com 87 PID 3332 wrote to memory of 312 3332 svchost.com 87 PID 3332 wrote to memory of 312 3332 svchost.com 87 PID 312 wrote to memory of 952 312 B5C217~1.EXE 88 PID 312 wrote to memory of 952 312 B5C217~1.EXE 88 PID 312 wrote to memory of 952 312 B5C217~1.EXE 88 PID 952 wrote to memory of 3848 952 svchost.com 89 PID 952 wrote to memory of 3848 952 svchost.com 89 PID 952 wrote to memory of 3848 952 svchost.com 89 PID 3848 wrote to memory of 1104 3848 B5C217~1.EXE 90 PID 3848 wrote to memory of 1104 3848 B5C217~1.EXE 90 PID 3848 wrote to memory of 1104 3848 B5C217~1.EXE 90 PID 1104 wrote to memory of 3328 1104 svchost.com 91 PID 1104 wrote to memory of 3328 1104 svchost.com 91 PID 1104 wrote to memory of 3328 1104 svchost.com 91 PID 3328 wrote to memory of 2016 3328 B5C217~1.EXE 124 PID 3328 wrote to memory of 2016 3328 B5C217~1.EXE 124 PID 3328 wrote to memory of 2016 3328 B5C217~1.EXE 124 PID 2016 wrote to memory of 5072 2016 svchost.exe 93 PID 2016 wrote to memory of 5072 2016 svchost.exe 93 PID 2016 wrote to memory of 5072 2016 svchost.exe 93 PID 5072 wrote to memory of 4860 5072 B5C217~1.EXE 94 PID 5072 wrote to memory of 4860 5072 B5C217~1.EXE 94 PID 5072 wrote to memory of 4860 5072 B5C217~1.EXE 94 PID 4860 wrote to memory of 936 4860 svchost.com 95 PID 4860 wrote to memory of 936 4860 svchost.com 95 PID 4860 wrote to memory of 936 4860 svchost.com 95 PID 936 wrote to memory of 1312 936 B5C217~1.EXE 97 PID 936 wrote to memory of 1312 936 B5C217~1.EXE 97 PID 936 wrote to memory of 1312 936 B5C217~1.EXE 97 PID 1312 wrote to memory of 2160 1312 svchost.com 98 PID 1312 wrote to memory of 2160 1312 svchost.com 98 PID 1312 wrote to memory of 2160 1312 svchost.com 98 PID 2160 wrote to memory of 1592 2160 B5C217~1.EXE 99 PID 2160 wrote to memory of 1592 2160 B5C217~1.EXE 99 PID 2160 wrote to memory of 1592 2160 B5C217~1.EXE 99 PID 1592 wrote to memory of 3004 1592 svchost.com 100 PID 1592 wrote to memory of 3004 1592 svchost.com 100 PID 1592 wrote to memory of 3004 1592 svchost.com 100 PID 3004 wrote to memory of 4292 3004 B5C217~1.EXE 101 PID 3004 wrote to memory of 4292 3004 B5C217~1.EXE 101 PID 3004 wrote to memory of 4292 3004 B5C217~1.EXE 101 PID 4292 wrote to memory of 4416 4292 svchost.com 102 PID 4292 wrote to memory of 4416 4292 svchost.com 102 PID 4292 wrote to memory of 4416 4292 svchost.com 102 PID 4416 wrote to memory of 2316 4416 B5C217~1.EXE 103 PID 4416 wrote to memory of 2316 4416 B5C217~1.EXE 103 PID 4416 wrote to memory of 2316 4416 B5C217~1.EXE 103 PID 2316 wrote to memory of 2664 2316 svchost.com 104 PID 2316 wrote to memory of 2664 2316 svchost.com 104 PID 2316 wrote to memory of 2664 2316 svchost.com 104 PID 2664 wrote to memory of 4456 2664 B5C217~1.EXE 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5c217dec6b5572652a097fdaa836700_exe32.exe"C:\Users\Admin\AppData\Local\Temp\b5c217dec6b5572652a097fdaa836700_exe32.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\b5c217dec6b5572652a097fdaa836700_exe32.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\b5c217dec6b5572652a097fdaa836700_exe32.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"11⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE12⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"17⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"23⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
PID:4924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"25⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1916 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"27⤵
- Executes dropped EXE
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE28⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"29⤵
- Executes dropped EXE
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE30⤵
- Executes dropped EXE
PID:4036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE32⤵
- Executes dropped EXE
- Modifies registry class
PID:4584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"33⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE34⤵PID:4764
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"35⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
PID:5004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"37⤵
- Executes dropped EXE
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
PID:3592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"39⤵
- Executes dropped EXE
PID:4108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE40⤵PID:1112
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"41⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE42⤵PID:4608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"43⤵
- Executes dropped EXE
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE44⤵
- Executes dropped EXE
- Modifies registry class
PID:1244 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"45⤵
- Executes dropped EXE
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
PID:932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"47⤵PID:4328
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"49⤵
- Executes dropped EXE
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
PID:3316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"51⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"53⤵
- Executes dropped EXE
PID:752 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE54⤵PID:4100
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"55⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE58⤵
- Executes dropped EXE
PID:2040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"59⤵
- Checks computer location settings
- Executes dropped EXE
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE60⤵PID:3672
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"61⤵
- Executes dropped EXE
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"63⤵
- Executes dropped EXE
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE64⤵PID:3880
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"65⤵PID:3792
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE66⤵PID:3436
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"67⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE68⤵
- Checks computer location settings
PID:4224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"69⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE70⤵PID:3180
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"71⤵PID:2152
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE72⤵PID:4824
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"73⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE74⤵PID:2128
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"75⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE76⤵
- Drops file in Windows directory
PID:1692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"77⤵PID:4576
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE78⤵
- Checks computer location settings
PID:3788 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"79⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE80⤵
- Modifies registry class
PID:3168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"81⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE82⤵PID:4708
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"83⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE84⤵PID:3612
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"85⤵PID:1068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE86⤵PID:4896
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"87⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE88⤵PID:4492
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"89⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE90⤵PID:3704
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"91⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE92⤵PID:4936
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"93⤵PID:4236
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE94⤵PID:1592
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"95⤵
- Executes dropped EXE
- Modifies registry class
PID:4608 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE96⤵PID:2988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"97⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE98⤵PID:872
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"99⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE100⤵PID:2152
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"101⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE102⤵PID:4476
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"103⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE104⤵
- Drops file in Windows directory
- Modifies registry class
PID:1908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"105⤵
- Drops file in Windows directory
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE106⤵
- Drops file in Windows directory
PID:4576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"107⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE108⤵
- Modifies registry class
PID:3768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"109⤵PID:1452
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE110⤵
- Modifies registry class
PID:4092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"111⤵PID:3496
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE112⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"113⤵
- Drops file in Windows directory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE114⤵PID:2636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"115⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE116⤵PID:2908
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"117⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE118⤵PID:824
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"119⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE120⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE"121⤵
- Drops file in Windows directory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B5C217~1.EXE122⤵
- Checks computer location settings
- Modifies registry class
PID:4652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-