Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
19-01-2024 21:07
Static task
static1
Behavioral task
behavioral1
Sample
68a4619be1f3efcc95a4fac79b12544b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
68a4619be1f3efcc95a4fac79b12544b.exe
Resource
win10v2004-20231222-en
General
-
Target
68a4619be1f3efcc95a4fac79b12544b.exe
-
Size
638KB
-
MD5
68a4619be1f3efcc95a4fac79b12544b
-
SHA1
305a32c6ac58a4daec2edd4f91c7dea9f9fccd41
-
SHA256
acd10a5e1a34f66e757669ebc7c4edf73d8a8adf6df73f7618edcc564a3c894c
-
SHA512
74d8b1153201c3a9b80270145350cbb90fa8143c203c36bcb480270479298b885811a94c05a333e0d638d6a926e3457e8260c9e6ff9eac3e21e00226eee7922b
-
SSDEEP
12288:BHnHA3xl3nNTR/nsy53/zGMJtvlZA/vE/x2q+luR:BHHin9R/s+37BVIl8
Malware Config
Extracted
xtremerat
majaaz.zapto.org
şᕸ왐majaaz.zapto.org
joeblack.zapto.org
şᕸ왐joeblack.zapto.org
Signatures
-
Detect XtremeRAT payload 31 IoCs
resource yara_rule behavioral2/memory/388-9-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/388-8-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/388-10-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/2352-17-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/388-49-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/4652-58-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/4652-60-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/4436-68-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/2036-79-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/2036-80-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/2800-88-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/3716-125-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/4364-137-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/5064-147-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/3716-151-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/5064-155-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/4248-200-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/4248-201-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/4792-214-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/4792-230-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/624-240-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/2404-259-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/1576-416-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/3532-432-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/2368-693-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/5556-710-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/5644-727-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/5780-739-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/3260-762-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/5780-765-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat behavioral2/memory/3260-788-0x0000000000C80000-0x0000000000CA8000-memory.dmp family_xtremerat -
Modifies WinLogon for persistence 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" 68a4619be1f3efcc95a4fac79b12544b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" 68a4619be1f3efcc95a4fac79b12544b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Adds policy Run key to start application 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" 68a4619be1f3efcc95a4fac79b12544b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Key created \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Svchost = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe -
Modifies Installed Components in the registry 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} 68a4619be1f3efcc95a4fac79b12544b.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\system32\\InstallDir\\Svhost.exe restart" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe restart" Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe restart" Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\system32\\InstallDir\\Svhost.exe restart" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe restart" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe restart" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe restart" Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\system32\\InstallDir\\Svhost.exe restart" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe restart" Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe restart" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\system32\\InstallDir\\Svhost.exe restart" 68a4619be1f3efcc95a4fac79b12544b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe restart" Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe restart" Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe restart" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe restart" Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe restart" Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe restart" Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe restart" Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe restart" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\system32\\InstallDir\\Svhost.exe restart" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe restart" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe restart" Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe restart" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe restart" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe restart" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe restart" Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\system32\\InstallDir\\Svhost.exe restart" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe restart" Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe restart" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\system32\\InstallDir\\Svhost.exe restart" Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe restart" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\system32\\InstallDir\\Svhost.exe restart" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\system32\\InstallDir\\Svhost.exe restart" Svhost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Svhost.exe -
Checks computer location settings 2 TTPs 29 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation 68a4619be1f3efcc95a4fac79b12544b.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe Key value queried \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\Control Panel\International\Geo\Nation Svhost.exe -
Deletes itself 1 IoCs
pid Process 2352 explorer.exe -
Executes dropped EXE 64 IoCs
pid Process 3688 Svhost.exe 4652 Svhost.exe 4348 Svhost.exe 2036 Svhost.exe 3356 Svhost.exe 3716 Svhost.exe 4044 Svhost.exe 5064 Svhost.exe 1544 Svhost.exe 5088 Svhost.exe 4248 Svhost.exe 4792 Svhost.exe 2312 Svhost.exe 5064 Svhost.exe 4860 Svhost.exe 1272 Svhost.exe 4208 Svhost.exe 60 Svhost.exe 2920 Svhost.exe 3972 Svhost.exe 1284 Svhost.exe 2248 Svhost.exe 3708 Svhost.exe 4980 Svhost.exe 1292 Svhost.exe 4964 Svhost.exe 4228 Svhost.exe 2576 Svhost.exe 3268 Svhost.exe 3708 Svhost.exe 3900 Svhost.exe 804 Svhost.exe 4296 Svhost.exe 4504 Svhost.exe 3228 Svhost.exe 3164 Svhost.exe 1104 Svhost.exe 3100 Svhost.exe 2824 Svhost.exe 4672 Svhost.exe 724 Svhost.exe 2780 Svhost.exe 1272 Svhost.exe 1612 Svhost.exe 3352 Svhost.exe 3164 Svhost.exe 1104 Svhost.exe 3944 Svhost.exe 548 Svhost.exe 2676 Svhost.exe 1400 Svhost.exe 1612 Svhost.exe 2824 Svhost.exe 1092 Svhost.exe 1808 Svhost.exe 5160 Svhost.exe 5148 Svhost.exe 5328 Svhost.exe 5452 Svhost.exe 5552 Svhost.exe 5572 Svhost.exe 5612 Svhost.exe 5708 Svhost.exe 5720 Svhost.exe -
resource yara_rule behavioral2/memory/388-1-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/388-2-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/388-3-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/388-7-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/388-9-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/388-8-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/388-10-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/2352-17-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/388-49-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/4652-57-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/4652-58-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/4652-60-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/4436-68-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/2036-77-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/2036-79-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/2036-80-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/2800-88-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/3716-125-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/4364-137-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/5064-147-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/3716-151-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/5064-155-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/4248-198-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/4248-200-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/4248-201-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/4792-214-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/4792-230-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/624-240-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/2404-259-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/1576-416-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/3532-432-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/2368-693-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/5556-710-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/5644-727-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/5780-739-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/3260-762-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/5780-765-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx behavioral2/memory/3260-788-0x0000000000C80000-0x0000000000CA8000-memory.dmp upx -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" 68a4619be1f3efcc95a4fac79b12544b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" 68a4619be1f3efcc95a4fac79b12544b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1168293393-3419776239-306423207-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\SysWOW64\\InstallDir\\Svhost.exe" Svhost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Svhost.exe" Svhost.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe 68a4619be1f3efcc95a4fac79b12544b.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ 68a4619be1f3efcc95a4fac79b12544b.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File created C:\Windows\SysWOW64\InstallDir\Svhost.exe Svhost.exe File opened for modification C:\Windows\SysWOW64\InstallDir\ Svhost.exe -
Suspicious use of SetThreadContext 50 IoCs
description pid Process procid_target PID 1220 set thread context of 388 1220 68a4619be1f3efcc95a4fac79b12544b.exe 92 PID 3688 set thread context of 4652 3688 Svhost.exe 113 PID 4348 set thread context of 2036 4348 Svhost.exe 125 PID 3356 set thread context of 3716 3356 Svhost.exe 136 PID 4044 set thread context of 5064 4044 Svhost.exe 143 PID 1544 set thread context of 4248 1544 Svhost.exe 155 PID 5088 set thread context of 4792 5088 Svhost.exe 157 PID 2312 set thread context of 5064 2312 Svhost.exe 168 PID 4860 set thread context of 1272 4860 Svhost.exe 174 PID 4208 set thread context of 3972 4208 Svhost.exe 191 PID 60 set thread context of 1284 60 Svhost.exe 196 PID 2920 set thread context of 2248 2920 Svhost.exe 197 PID 3708 set thread context of 1292 3708 Svhost.exe 213 PID 4980 set thread context of 4964 4980 Svhost.exe 215 PID 4228 set thread context of 3268 4228 Svhost.exe 222 PID 2576 set thread context of 3708 2576 Svhost.exe 226 PID 3900 set thread context of 804 3900 Svhost.exe 236 PID 4296 set thread context of 4504 4296 Svhost.exe 244 PID 3228 set thread context of 3100 3228 Svhost.exe 260 PID 3164 set thread context of 2824 3164 Svhost.exe 265 PID 1104 set thread context of 4672 1104 Svhost.exe 266 PID 724 set thread context of 1272 724 Svhost.exe 282 PID 2780 set thread context of 1612 2780 Svhost.exe 284 PID 3352 set thread context of 1104 3352 Svhost.exe 291 PID 3164 set thread context of 3944 3164 Svhost.exe 298 PID 548 set thread context of 1400 548 Svhost.exe 312 PID 2676 set thread context of 2824 2676 Svhost.exe 320 PID 1612 set thread context of 1808 1612 Svhost.exe 324 PID 1092 set thread context of 5148 1092 Svhost.exe 333 PID 5160 set thread context of 5328 5160 Svhost.exe 346 PID 5452 set thread context of 5572 5452 Svhost.exe 360 PID 5552 set thread context of 5708 5552 Svhost.exe 367 PID 5612 set thread context of 5720 5612 Svhost.exe 368 PID 5716 set thread context of 5808 5716 Svhost.exe 389 PID 5640 set thread context of 6136 5640 Svhost.exe 392 PID 5916 set thread context of 5188 5916 Svhost.exe 403 PID 6072 set thread context of 5644 6072 Svhost.exe 413 PID 5900 set thread context of 5812 5900 Svhost.exe 423 PID 5912 set thread context of 1808 5912 Svhost.exe 437 PID 5720 set thread context of 5452 5720 Svhost.exe 445 PID 5776 set thread context of 5780 5776 Svhost.exe 459 PID 216 set thread context of 1076 216 Svhost.exe 462 PID 4864 set thread context of 3260 4864 Svhost.exe 472 PID 6176 set thread context of 6264 6176 Svhost.exe 489 PID 6216 set thread context of 6280 6216 Svhost.exe 490 PID 6556 set thread context of 6620 6556 Svhost.exe 497 PID 6916 set thread context of 7008 6916 Svhost.exe 511 PID 6988 set thread context of 7132 6988 Svhost.exe 516 PID 3656 set thread context of 6396 3656 Svhost.exe 529 PID 6464 set thread context of 5940 6464 Svhost.exe 536 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 22 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 68a4619be1f3efcc95a4fac79b12544b.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Svhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1220 wrote to memory of 388 1220 68a4619be1f3efcc95a4fac79b12544b.exe 92 PID 1220 wrote to memory of 388 1220 68a4619be1f3efcc95a4fac79b12544b.exe 92 PID 1220 wrote to memory of 388 1220 68a4619be1f3efcc95a4fac79b12544b.exe 92 PID 1220 wrote to memory of 388 1220 68a4619be1f3efcc95a4fac79b12544b.exe 92 PID 1220 wrote to memory of 388 1220 68a4619be1f3efcc95a4fac79b12544b.exe 92 PID 1220 wrote to memory of 388 1220 68a4619be1f3efcc95a4fac79b12544b.exe 92 PID 1220 wrote to memory of 388 1220 68a4619be1f3efcc95a4fac79b12544b.exe 92 PID 1220 wrote to memory of 388 1220 68a4619be1f3efcc95a4fac79b12544b.exe 92 PID 388 wrote to memory of 436 388 68a4619be1f3efcc95a4fac79b12544b.exe 94 PID 388 wrote to memory of 436 388 68a4619be1f3efcc95a4fac79b12544b.exe 94 PID 388 wrote to memory of 436 388 68a4619be1f3efcc95a4fac79b12544b.exe 94 PID 388 wrote to memory of 2544 388 68a4619be1f3efcc95a4fac79b12544b.exe 95 PID 388 wrote to memory of 2544 388 68a4619be1f3efcc95a4fac79b12544b.exe 95 PID 388 wrote to memory of 2352 388 68a4619be1f3efcc95a4fac79b12544b.exe 98 PID 388 wrote to memory of 2352 388 68a4619be1f3efcc95a4fac79b12544b.exe 98 PID 388 wrote to memory of 2352 388 68a4619be1f3efcc95a4fac79b12544b.exe 98 PID 388 wrote to memory of 2352 388 68a4619be1f3efcc95a4fac79b12544b.exe 98 PID 388 wrote to memory of 2544 388 68a4619be1f3efcc95a4fac79b12544b.exe 95 PID 388 wrote to memory of 2152 388 68a4619be1f3efcc95a4fac79b12544b.exe 100 PID 388 wrote to memory of 2152 388 68a4619be1f3efcc95a4fac79b12544b.exe 100 PID 388 wrote to memory of 2152 388 68a4619be1f3efcc95a4fac79b12544b.exe 100 PID 388 wrote to memory of 2892 388 68a4619be1f3efcc95a4fac79b12544b.exe 103 PID 388 wrote to memory of 2892 388 68a4619be1f3efcc95a4fac79b12544b.exe 103 PID 388 wrote to memory of 2892 388 68a4619be1f3efcc95a4fac79b12544b.exe 103 PID 388 wrote to memory of 4796 388 68a4619be1f3efcc95a4fac79b12544b.exe 104 PID 388 wrote to memory of 4796 388 68a4619be1f3efcc95a4fac79b12544b.exe 104 PID 388 wrote to memory of 4796 388 68a4619be1f3efcc95a4fac79b12544b.exe 104 PID 388 wrote to memory of 2680 388 68a4619be1f3efcc95a4fac79b12544b.exe 105 PID 388 wrote to memory of 2680 388 68a4619be1f3efcc95a4fac79b12544b.exe 105 PID 388 wrote to memory of 2680 388 68a4619be1f3efcc95a4fac79b12544b.exe 105 PID 388 wrote to memory of 4460 388 68a4619be1f3efcc95a4fac79b12544b.exe 106 PID 388 wrote to memory of 4460 388 68a4619be1f3efcc95a4fac79b12544b.exe 106 PID 388 wrote to memory of 4460 388 68a4619be1f3efcc95a4fac79b12544b.exe 106 PID 388 wrote to memory of 4088 388 68a4619be1f3efcc95a4fac79b12544b.exe 107 PID 388 wrote to memory of 4088 388 68a4619be1f3efcc95a4fac79b12544b.exe 107 PID 388 wrote to memory of 4088 388 68a4619be1f3efcc95a4fac79b12544b.exe 107 PID 388 wrote to memory of 3132 388 68a4619be1f3efcc95a4fac79b12544b.exe 109 PID 388 wrote to memory of 3132 388 68a4619be1f3efcc95a4fac79b12544b.exe 109 PID 388 wrote to memory of 3688 388 68a4619be1f3efcc95a4fac79b12544b.exe 110 PID 388 wrote to memory of 3688 388 68a4619be1f3efcc95a4fac79b12544b.exe 110 PID 388 wrote to memory of 3688 388 68a4619be1f3efcc95a4fac79b12544b.exe 110 PID 3688 wrote to memory of 4652 3688 Svhost.exe 113 PID 3688 wrote to memory of 4652 3688 Svhost.exe 113 PID 3688 wrote to memory of 4652 3688 Svhost.exe 113 PID 3688 wrote to memory of 4652 3688 Svhost.exe 113 PID 3688 wrote to memory of 4652 3688 Svhost.exe 113 PID 3688 wrote to memory of 4652 3688 Svhost.exe 113 PID 3688 wrote to memory of 4652 3688 Svhost.exe 113 PID 3688 wrote to memory of 4652 3688 Svhost.exe 113 PID 4652 wrote to memory of 4436 4652 Svhost.exe 114 PID 4652 wrote to memory of 4436 4652 Svhost.exe 114 PID 4652 wrote to memory of 4436 4652 Svhost.exe 114 PID 4652 wrote to memory of 4436 4652 Svhost.exe 114 PID 4652 wrote to memory of 4924 4652 Svhost.exe 115 PID 4652 wrote to memory of 4924 4652 Svhost.exe 115 PID 4652 wrote to memory of 4916 4652 Svhost.exe 116 PID 4652 wrote to memory of 4916 4652 Svhost.exe 116 PID 4652 wrote to memory of 4916 4652 Svhost.exe 116 PID 4652 wrote to memory of 4924 4652 Svhost.exe 115 PID 4652 wrote to memory of 3892 4652 Svhost.exe 117 PID 4652 wrote to memory of 3892 4652 Svhost.exe 117 PID 4652 wrote to memory of 3892 4652 Svhost.exe 117 PID 4652 wrote to memory of 3456 4652 Svhost.exe 118 PID 4652 wrote to memory of 3456 4652 Svhost.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\68a4619be1f3efcc95a4fac79b12544b.exe"C:\Users\Admin\AppData\Local\Temp\68a4619be1f3efcc95a4fac79b12544b.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\68a4619be1f3efcc95a4fac79b12544b.exeC:\Users\Admin\AppData\Local\Temp\68a4619be1f3efcc95a4fac79b12544b.exe2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2544
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Deletes itself
PID:2352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2152
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3132
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\system32\InstallDir\Svhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe4⤵
- Modifies WinLogon for persistence
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Modifies registry class
PID:4436 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3356 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
PID:3716 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3856
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe8⤵PID:4364
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4552
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5088 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:4792 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4160
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4560
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4848
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3484
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4612
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4860 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe9⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:1272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2296
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe10⤵PID:2404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:3984
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:3416
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:3652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:3980
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\system32\InstallDir\Svhost.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:60 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe11⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:1284 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:3500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:1888
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:1592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:1420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:2964
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:3356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:2352
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\SysWOW64\InstallDir\Svhost.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4228 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe13⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3268 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:1552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:1652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:1408
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2312 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:5064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:964
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe8⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4832
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:640
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\system32\InstallDir\Svhost.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4208 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe9⤵
- Modifies WinLogon for persistence
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:3972 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4792
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4540
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4976
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2232
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2648
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4264
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\SysWOW64\InstallDir\Svhost.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4980 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe11⤵
- Modifies WinLogon for persistence
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4964 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:3928
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:3272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:2312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5004
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2920 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Executes dropped EXE
PID:2248
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3708 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
PID:1292 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2804
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2576 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:3708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2920
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4520
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4296 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe9⤵
- Modifies WinLogon for persistence
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:4504 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1220
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe10⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2336
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:624
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2944
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\system32\InstallDir\Svhost.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3164 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe11⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:2824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:2728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:1604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:1672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:3448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:3176
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:3112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:4504
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\SysWOW64\InstallDir\Svhost.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3352 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe13⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1104 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:4644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:3240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:880
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:2672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:4492
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\SysWOW64\InstallDir\Svhost.exe"14⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1612 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe15⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:3036
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:1504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:5140
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:5252
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:5276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:5304
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:5376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"16⤵PID:5420
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\SysWOW64\InstallDir\Svhost.exe"16⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5452 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe17⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:5572 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"18⤵PID:5664
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"18⤵PID:5680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"18⤵PID:5700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"18⤵PID:5796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"18⤵PID:6076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"18⤵PID:4860
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"18⤵PID:5584
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"18⤵PID:5740
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\SysWOW64\InstallDir\Svhost.exe"18⤵
- Suspicious use of SetThreadContext
PID:5640 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe19⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in System32 directory
PID:6136 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"20⤵PID:5932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"20⤵PID:6000
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"20⤵PID:6060
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"20⤵PID:1608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"20⤵PID:2912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"20⤵PID:5520
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"20⤵PID:5524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3900 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:804 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:828
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe8⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4604
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4292
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1280
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5020
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2576
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\system32\InstallDir\Svhost.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3228 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe9⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:3100 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4544
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:448
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2536
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4868
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2408
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1856
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\SysWOW64\InstallDir\Svhost.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2780 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe11⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1612 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:4404
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:3532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5048
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:2780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:1272
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:1740
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:1540
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\SysWOW64\InstallDir\Svhost.exe"12⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:548 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe13⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1400 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:2796
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:4532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:4936
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:5024
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:2108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:2376
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:5132
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1104 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Executes dropped EXE
PID:4672
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:724 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1272 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2540
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3164 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:3944 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3004
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3192
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5096
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1660
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"8⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1092 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe9⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:5148 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5240
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5268
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5296
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5320
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5412
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5492
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5508
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"10⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5612 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe11⤵
- Executes dropped EXE
PID:5720
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2676 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2824 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5124
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5260
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5312
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5160 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:5328 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5428
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5480
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5500
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5624
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5552 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:5708 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5884
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6088
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5332
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5552
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5388
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6036
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"8⤵
- Suspicious use of SetThreadContext
PID:5916 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe9⤵
- Adds policy Run key to start application
- Modifies Installed Components in the registry
PID:5188 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5392
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5212
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5876
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5824
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Suspicious use of SetThreadContext
PID:5716 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:5808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5924
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5968
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:440
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5744
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"8⤵
- Suspicious use of SetThreadContext
PID:5900 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe9⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
PID:5812 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5616
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe10⤵PID:2368
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5184
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5872
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:2676
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5652
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Suspicious use of SetThreadContext
PID:6072 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
PID:5644 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:3764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5732
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2396
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6068
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5712
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5232
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"8⤵
- Suspicious use of SetThreadContext
PID:5912 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe9⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:1808 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5804
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe10⤵PID:5556
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5904
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5488
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5900
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5460
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:4348
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5572
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5912
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\system32\InstallDir\Svhost.exe"10⤵
- Suspicious use of SetThreadContext
PID:5776 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe11⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:5780 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5840
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:3496
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:5720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:216
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:1808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:4144
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"12⤵PID:4932
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\SysWOW64\InstallDir\Svhost.exe"12⤵
- Suspicious use of SetThreadContext
PID:6176 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe13⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
PID:6264 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:6380
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:6532
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:6592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:6600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"14⤵PID:6612
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Suspicious use of SetThreadContext
PID:5720 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:5452 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5920
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe8⤵PID:5644
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:452
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5436
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5812
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:4028
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\system32\InstallDir\Svhost.exe"8⤵
- Suspicious use of SetThreadContext
PID:4864 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe9⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
PID:3260 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:5776
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1632
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6064
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6168
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6236
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6248
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6256
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Suspicious use of SetThreadContext
PID:216 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
PID:1076 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2400
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5612
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:2808
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5864
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6156
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"8⤵
- Suspicious use of SetThreadContext
PID:6216 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe9⤵PID:6280
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Suspicious use of SetThreadContext
PID:6556 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
PID:6620 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6688
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6700
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6708
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6720
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6944
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6952
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6964
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"8⤵
- Suspicious use of SetThreadContext
PID:6988 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe9⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
PID:7132 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6196
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe10⤵PID:2028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1076
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6276
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6224
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6376
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Suspicious use of SetThreadContext
PID:6916 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:7008 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:7092
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe8⤵PID:7100
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:7112
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:7120
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6208
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6028
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6340
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6356
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6392
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\system32\InstallDir\Svhost.exe"8⤵
- Suspicious use of SetThreadContext
PID:6464 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe9⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Adds Run key to start application
- Drops file in System32 directory
PID:5940 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6668
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:1044
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"10⤵PID:6832
-
-
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵
- Suspicious use of SetThreadContext
PID:3656 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe7⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Drops file in System32 directory
PID:6396 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:5808
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe8⤵PID:6420
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6504
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6652
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6608
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:1640
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"8⤵PID:6820
-
-
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"6⤵PID:6684
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:4924
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe5⤵PID:4916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:3892
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:3456
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:3568
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:5104
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:1600
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:3824
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:3924
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4348 -
C:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exeC:\Users\Admin\AppData\Roaming\InstallDir\Svhost.exe6⤵
- Modifies WinLogon for persistence
- Modifies Installed Components in the registry
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:2036 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:4564
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe7⤵PID:2800
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:3180
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:1228
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:3736
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:4032
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:5108
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:3576
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"7⤵PID:3508
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\system32\InstallDir\Svhost.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4044 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe8⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:5064 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"9⤵PID:2620
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"9⤵PID:3472
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"9⤵PID:4172
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"9⤵PID:4516
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"9⤵PID:3344
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"9⤵PID:1932
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"9⤵PID:3592
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"9⤵PID:4148
-
-
C:\Windows\SysWOW64\InstallDir\Svhost.exe"C:\Windows\SysWOW64\InstallDir\Svhost.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1544 -
C:\Windows\SysWOW64\InstallDir\Svhost.exeC:\Windows\SysWOW64\InstallDir\Svhost.exe10⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4248 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"11⤵PID:2412
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5ef1da37a1488a2dd0205a87b6e81822e
SHA1a5a161db43c5e06f836fd8be2776e5c0a70e9848
SHA256558375823cc8f1e9b9065b53bedf44c96ad60ce64aa0de946f8ce6548a8364ef
SHA512435488d21a95c9a434d578c4d808cd99806eca8f93161960557c4f012accfae38fed80b0fb8dd0b1727a5c30b3689e75367796b4a0c42532a216bb380d002cd1
-
Filesize
1KB
MD52d406af19d5440406488622b736a4f5a
SHA1c7b2dee5c14298cc1bc412fc0ac79ff8ab95d8cb
SHA2569cdd2dce1dc379cb781f3e10b50500250dc2c2f57bd292beb1a2c5d7bbdc6a1b
SHA5121e462ba1dd6121b47e3e23409edfd35b03620e6db3e2cdb1893b3595900566846b8bd0a5091eb5e6b57b60cb16d95981ff9f20bfc684ed8a20b438ee4c6fad4d
-
Filesize
638KB
MD568a4619be1f3efcc95a4fac79b12544b
SHA1305a32c6ac58a4daec2edd4f91c7dea9f9fccd41
SHA256acd10a5e1a34f66e757669ebc7c4edf73d8a8adf6df73f7618edcc564a3c894c
SHA51274d8b1153201c3a9b80270145350cbb90fa8143c203c36bcb480270479298b885811a94c05a333e0d638d6a926e3457e8260c9e6ff9eac3e21e00226eee7922b