Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
18s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 10:44
Static task
static1
Behavioral task
behavioral1
Sample
181e3cfa9e8cbffaf87ec8d02e6a7020.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
181e3cfa9e8cbffaf87ec8d02e6a7020.exe
Resource
win10v2004-20231222-en
General
-
Target
181e3cfa9e8cbffaf87ec8d02e6a7020.exe
-
Size
191KB
-
MD5
181e3cfa9e8cbffaf87ec8d02e6a7020
-
SHA1
c544710ac9fb655f8abb059a7f8ae04c3606c2c3
-
SHA256
c6e3089448b381cd296f85148257a61a75a3f69e6e726c7015cdf433145d1336
-
SHA512
5b9efa2cf0afe564e55ffb47953c730d9363b1c559aaff72b90a04a1ee4e796126034be4995289e2132dbc14498ab6496f1db3c7f58cbd74c20f7b134884f09b
-
SSDEEP
3072:3/na6WDmrZ5Cn79xvlr2xmOJ5wUuWXcfb0hw7IACb873684yVcx566/znwVT8I0k:3/nuDm9knmhJ4/sMLuO6/zCg9a
Malware Config
Signatures
-
Drops file in Drivers directory 64 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\System32\drivers\etc\hosts 181e3cfa9e8cbffaf87ec8d02e6a7020.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key value queried \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\Control Panel\International\Geo\Nation 181e3cfa9e8cbffaf87ec8d02e6a7020.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File created C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe File opened for modification C:\Windows\SysWOW64\mm.vbs 181e3cfa9e8cbffaf87ec8d02e6a7020.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag\CLSID = "{13709620-C279-11CE-A49E-444553540000}" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\InProcServer32\ThreadingModel = "Apartment" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag\Param2 = "%ProgramFiles(x86)%\\Internet Explorer\\iexplore.exe" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\InProcServer32 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\CLSID = "{3f454f0e-42ae-4d7c-8ea3-328250d6e272}" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag\method = "ShellExecute" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\InProcServer32\ThreadingModel = "Apartment" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag\method = "ShellExecute" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag\Param1 = "http://%77%77%77%2e%37%34%30%30%2e%6e%65%74" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shellex\ContextMenuHandlers 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag\Param1 = "http://%77%77%77%2e%37%34%30%30%2e%6e%65%74" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\shellex\MayChangeDefaultMenu 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\shellex\MayChangeDefaultMenu\ 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag\method = "ShellExecute" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shellex\ContextMenuHandlers\ieframe 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\InProcServer32\ThreadingModel = "Apartment" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag\command = "´ò¿ªÖ÷Ò³" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\shellex\MayChangeDefaultMenu 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag\method = "ShellExecute" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\InProcServer32\ThreadingModel = "Apartment" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\CLSID = "{3f454f0e-42ae-4d7c-8ea3-328250d6e272}" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\Shellex\ContextMenuHandlers\ieframe 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shellex\ContextMenuHandlers\ieframe 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shellex 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag\Param1 = "http://%77%77%77%2e%37%34%30%30%2e%6e%65%74" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\InProcServer32\ = "%SystemRoot%\\SysWow64\\shdocvw.dll" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag\Param1 = "http://%77%77%77%2e%37%34%30%30%2e%6e%65%74" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\CLSID = "{3f454f0e-42ae-4d7c-8ea3-328250d6e272}" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shellex\ContextMenuHandlers\ieframe 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\CLSID = "{3f454f0e-42ae-4d7c-8ea3-328250d6e272}" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\ShellFolder 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\CLSID = "{3f454f0e-42ae-4d7c-8ea3-328250d6e272}" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shellex 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shellex 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag\CLSID = "{13709620-C279-11CE-A49E-444553540000}" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shellex 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag\CLSID = "{13709620-C279-11CE-A49E-444553540000}" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag\Param1 = "http://%77%77%77%2e%37%34%30%30%2e%6e%65%74" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\CLSID = "{3f454f0e-42ae-4d7c-8ea3-328250d6e272}" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\Instance\InitPropertyBag\method = "ShellExecute" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D} 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\shellex\MayChangeDefaultMenu 181e3cfa9e8cbffaf87ec8d02e6a7020.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{38198240-9949-6693-3819-994984269142}\InProcServer32\ThreadingModel = "Apartment" 181e3cfa9e8cbffaf87ec8d02e6a7020.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5088 wrote to memory of 636 5088 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 95 PID 5088 wrote to memory of 636 5088 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 95 PID 5088 wrote to memory of 636 5088 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 95 PID 636 wrote to memory of 1848 636 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 96 PID 636 wrote to memory of 1848 636 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 96 PID 636 wrote to memory of 1848 636 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 96 PID 1848 wrote to memory of 3892 1848 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 97 PID 1848 wrote to memory of 3892 1848 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 97 PID 1848 wrote to memory of 3892 1848 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 97 PID 3892 wrote to memory of 1324 3892 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 98 PID 3892 wrote to memory of 1324 3892 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 98 PID 3892 wrote to memory of 1324 3892 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 98 PID 1324 wrote to memory of 3356 1324 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 99 PID 1324 wrote to memory of 3356 1324 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 99 PID 1324 wrote to memory of 3356 1324 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 99 PID 3356 wrote to memory of 2204 3356 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 100 PID 3356 wrote to memory of 2204 3356 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 100 PID 3356 wrote to memory of 2204 3356 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 100 PID 2204 wrote to memory of 2036 2204 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 101 PID 2204 wrote to memory of 2036 2204 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 101 PID 2204 wrote to memory of 2036 2204 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 101 PID 2036 wrote to memory of 4528 2036 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 102 PID 2036 wrote to memory of 4528 2036 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 102 PID 2036 wrote to memory of 4528 2036 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 102 PID 4528 wrote to memory of 1288 4528 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 103 PID 4528 wrote to memory of 1288 4528 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 103 PID 4528 wrote to memory of 1288 4528 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 103 PID 1288 wrote to memory of 4332 1288 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 104 PID 1288 wrote to memory of 4332 1288 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 104 PID 1288 wrote to memory of 4332 1288 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 104 PID 4332 wrote to memory of 4592 4332 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 105 PID 4332 wrote to memory of 4592 4332 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 105 PID 4332 wrote to memory of 4592 4332 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 105 PID 4592 wrote to memory of 3916 4592 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 106 PID 4592 wrote to memory of 3916 4592 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 106 PID 4592 wrote to memory of 3916 4592 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 106 PID 3916 wrote to memory of 4452 3916 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 107 PID 3916 wrote to memory of 4452 3916 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 107 PID 3916 wrote to memory of 4452 3916 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 107 PID 4452 wrote to memory of 3368 4452 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 108 PID 4452 wrote to memory of 3368 4452 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 108 PID 4452 wrote to memory of 3368 4452 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 108 PID 3368 wrote to memory of 260 3368 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 109 PID 3368 wrote to memory of 260 3368 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 109 PID 3368 wrote to memory of 260 3368 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 109 PID 260 wrote to memory of 2660 260 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 110 PID 260 wrote to memory of 2660 260 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 110 PID 260 wrote to memory of 2660 260 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 110 PID 2660 wrote to memory of 3900 2660 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 111 PID 2660 wrote to memory of 3900 2660 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 111 PID 2660 wrote to memory of 3900 2660 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 111 PID 3900 wrote to memory of 4724 3900 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 112 PID 3900 wrote to memory of 4724 3900 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 112 PID 3900 wrote to memory of 4724 3900 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 112 PID 4724 wrote to memory of 216 4724 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 113 PID 4724 wrote to memory of 216 4724 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 113 PID 4724 wrote to memory of 216 4724 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 113 PID 216 wrote to memory of 828 216 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 114 PID 216 wrote to memory of 828 216 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 114 PID 216 wrote to memory of 828 216 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 114 PID 828 wrote to memory of 2868 828 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 115 PID 828 wrote to memory of 2868 828 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 115 PID 828 wrote to memory of 2868 828 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 115 PID 2868 wrote to memory of 2212 2868 181e3cfa9e8cbffaf87ec8d02e6a7020.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"2⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"3⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"4⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"5⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"6⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"7⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"8⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"9⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"10⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"11⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"12⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"13⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"14⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"15⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"16⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:260 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"17⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"18⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"19⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"20⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"21⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"22⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"23⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"24⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:224 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"25⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"26⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5148 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"27⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5244 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"28⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:5336 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"29⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:5428 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"30⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5524 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"31⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:5616 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"32⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5704 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"33⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:5800 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"34⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:5936 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"35⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:6028 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"36⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:6124 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"37⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5220 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"38⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:5408 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"39⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"40⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:5624 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"41⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:5792 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"42⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:6036 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"43⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:5228 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"44⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"45⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5928 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"46⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:5200 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"47⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5768 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"48⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:5196 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"49⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:6100 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"50⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:3664 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"51⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"52⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5848 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"53⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:6228 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"54⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:6320 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"55⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:6408 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"56⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:6500 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"57⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:6588 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"58⤵PID:6680
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"59⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:6820 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"60⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
PID:6920 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"61⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:7008 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"62⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:7104 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"63⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:6200 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"64⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:6380 -
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"65⤵PID:6536
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"66⤵PID:6748
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"67⤵PID:6892
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"68⤵PID:7112
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"69⤵PID:6372
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"70⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"71⤵PID:4204
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"72⤵PID:6312
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"73⤵PID:7016
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"74⤵PID:6220
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"75⤵PID:7208
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"76⤵PID:7300
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"77⤵PID:7392
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"78⤵PID:7480
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"79⤵PID:7572
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"80⤵PID:7660
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"81⤵PID:7756
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"82⤵PID:7848
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"83⤵PID:7944
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"84⤵PID:8032
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"85⤵PID:8128
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"86⤵PID:7276
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"87⤵PID:7452
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"88⤵PID:7636
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"89⤵PID:7808
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"90⤵PID:8004
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"91⤵PID:8168
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"92⤵PID:7384
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"93⤵PID:7748
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"94⤵PID:6844
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"95⤵PID:7920
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"96⤵PID:7764
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"97⤵PID:8096
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"98⤵PID:8268
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"99⤵PID:8364
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"100⤵PID:8452
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"101⤵PID:8544
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"102⤵PID:8632
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"103⤵PID:8764
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"104⤵PID:8904
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"105⤵PID:9016
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"106⤵PID:9104
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"107⤵PID:9208
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"108⤵PID:8372
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"109⤵PID:8572
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"110⤵PID:8732
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"111⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"112⤵PID:9072
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"113⤵PID:8292
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"114⤵PID:8684
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"115⤵PID:8944
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"116⤵PID:8400
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"117⤵PID:9168
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"118⤵PID:9184
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"119⤵PID:9284
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"120⤵PID:9380
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"121⤵PID:9468
-
C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"C:\Users\Admin\AppData\Local\Temp\181e3cfa9e8cbffaf87ec8d02e6a7020.exe"122⤵PID:9576
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-