Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14-03-2024 19:48
Behavioral task
behavioral1
Sample
56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe
Resource
win10v2004-20240226-en
General
-
Target
56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe
-
Size
174KB
-
MD5
46d423d2735e9147843a59d4c88cf0b0
-
SHA1
49ec9da7c7ffdd3acbb623ab811ec1534985cc86
-
SHA256
56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44
-
SHA512
5e080c3380612a4ab2e079198d53c36af909575e64f04ed79ca8b1c709793c165a49ece9887f876f06c98b5f45df366a7d617260a623ceaa477170df141366de
-
SSDEEP
3072:sr85CkKi0n88LmIfVJY/trRoWNLUa7NQa6qzTf0r85C:k9k5imIfAlCWNL3QOfs9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000900000002270d-4.dat family_neshta behavioral2/files/0x000900000002270d-8.dat family_neshta behavioral2/files/0x000900000002270d-6.dat family_neshta behavioral2/files/0x000900000002270d-17.dat family_neshta behavioral2/files/0x00070000000231fd-19.dat family_neshta behavioral2/memory/5060-18-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000900000002270d-28.dat family_neshta behavioral2/memory/3828-29-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2548-34-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000900000002270d-53.dat family_neshta behavioral2/memory/3644-46-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000900000002270d-65.dat family_neshta behavioral2/memory/1268-70-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000900000002270d-77.dat family_neshta behavioral2/files/0x000900000002270d-89.dat family_neshta behavioral2/files/0x000900000002270d-124.dat family_neshta behavioral2/memory/4368-117-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1688-125-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000900000002270d-136.dat family_neshta behavioral2/files/0x000100000002130d-151.dat family_neshta behavioral2/memory/4896-177-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167ca-193.dat family_neshta behavioral2/files/0x000100000001e731-221.dat family_neshta behavioral2/memory/4392-236-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4152-247-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3644-259-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4260-261-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1640-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3720-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1980-291-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2884-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4168-300-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4368-302-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2040-308-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1064-310-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4548-323-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1364-324-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3584-326-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5108-339-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1504-347-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2796-355-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4040-363-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4344-356-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2680-364-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2200-366-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1320-372-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4000-379-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3552-380-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2928-382-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2352-390-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2404-398-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1980-396-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3720-388-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/116-348-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3828-340-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4924-332-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4912-406-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3464-414-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1348-422-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5060-435-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3016-428-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4920-420-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4368-412-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2884-404-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000\Control Panel\International\Geo\Nation 56BB21~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 3516 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe 5060 svchost.com 3828 56BB21~1.EXE 3836 svchost.com 2548 56BB21~1.EXE 2796 svchost.com 3644 56BB21~1.EXE 2276 svchost.com 4000 56BB21~1.EXE 3600 svchost.com 1268 56BB21~1.EXE 3552 svchost.com 1772 56BB21~1.EXE 4016 svchost.com 4368 56BB21~1.EXE 1688 svchost.com 3008 56BB21~1.EXE 1364 svchost.com 4896 56BB21~1.EXE 3332 svchost.com 4392 56BB21~1.EXE 3956 svchost.com 4152 56BB21~1.EXE 3644 svchost.com 4260 56BB21~1.EXE 4552 svchost.com 1640 56BB21~1.EXE 3720 svchost.com 1980 56BB21~1.EXE 848 svchost.com 2884 56BB21~1.EXE 4168 svchost.com 4368 56BB21~1.EXE 2040 svchost.com 1064 56BB21~1.EXE 4780 svchost.com 4548 56BB21~1.EXE 1364 svchost.com 3584 56BB21~1.EXE 4924 svchost.com 5108 56BB21~1.EXE 3828 svchost.com 1504 56BB21~1.EXE 116 svchost.com 2796 56BB21~1.EXE 4344 svchost.com 4040 56BB21~1.EXE 2680 svchost.com 2200 56BB21~1.EXE 1320 svchost.com 4000 56BB21~1.EXE 3552 svchost.com 2928 56BB21~1.EXE 3720 svchost.com 2352 56BB21~1.EXE 1980 svchost.com 2404 56BB21~1.EXE 2884 svchost.com 4912 56BB21~1.EXE 4368 svchost.com 3464 56BB21~1.EXE 4920 svchost.com 1348 56BB21~1.EXE 3016 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MICROS~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~3\PACKAG~1\{FB050~1\WINDOW~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MICROS~4.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MICROS~3.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MI391D~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.17\MICROS~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\svchost.com 56BB21~1.EXE File opened for modification C:\Windows\directx.sys 56BB21~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE Key created \REGISTRY\USER\S-1-5-21-275798769-4264537674-1142822080-1000_Classes\Local Settings 56BB21~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1924 wrote to memory of 3516 1924 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe 90 PID 1924 wrote to memory of 3516 1924 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe 90 PID 1924 wrote to memory of 3516 1924 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe 90 PID 3516 wrote to memory of 5060 3516 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe 155 PID 3516 wrote to memory of 5060 3516 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe 155 PID 3516 wrote to memory of 5060 3516 56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe 155 PID 5060 wrote to memory of 3828 5060 svchost.com 414 PID 5060 wrote to memory of 3828 5060 svchost.com 414 PID 5060 wrote to memory of 3828 5060 svchost.com 414 PID 3828 wrote to memory of 3836 3828 56BB21~1.EXE 157 PID 3828 wrote to memory of 3836 3828 56BB21~1.EXE 157 PID 3828 wrote to memory of 3836 3828 56BB21~1.EXE 157 PID 3836 wrote to memory of 2548 3836 svchost.com 95 PID 3836 wrote to memory of 2548 3836 svchost.com 95 PID 3836 wrote to memory of 2548 3836 svchost.com 95 PID 2548 wrote to memory of 2796 2548 56BB21~1.EXE 96 PID 2548 wrote to memory of 2796 2548 56BB21~1.EXE 96 PID 2548 wrote to memory of 2796 2548 56BB21~1.EXE 96 PID 2796 wrote to memory of 3644 2796 svchost.com 114 PID 2796 wrote to memory of 3644 2796 svchost.com 114 PID 2796 wrote to memory of 3644 2796 svchost.com 114 PID 3644 wrote to memory of 2276 3644 56BB21~1.EXE 98 PID 3644 wrote to memory of 2276 3644 56BB21~1.EXE 98 PID 3644 wrote to memory of 2276 3644 56BB21~1.EXE 98 PID 2276 wrote to memory of 4000 2276 svchost.com 99 PID 2276 wrote to memory of 4000 2276 svchost.com 99 PID 2276 wrote to memory of 4000 2276 svchost.com 99 PID 4000 wrote to memory of 3600 4000 56BB21~1.EXE 100 PID 4000 wrote to memory of 3600 4000 56BB21~1.EXE 100 PID 4000 wrote to memory of 3600 4000 56BB21~1.EXE 100 PID 3600 wrote to memory of 1268 3600 svchost.com 101 PID 3600 wrote to memory of 1268 3600 svchost.com 101 PID 3600 wrote to memory of 1268 3600 svchost.com 101 PID 1268 wrote to memory of 3552 1268 56BB21~1.EXE 402 PID 1268 wrote to memory of 3552 1268 56BB21~1.EXE 402 PID 1268 wrote to memory of 3552 1268 56BB21~1.EXE 402 PID 3552 wrote to memory of 1772 3552 svchost.com 404 PID 3552 wrote to memory of 1772 3552 svchost.com 404 PID 3552 wrote to memory of 1772 3552 svchost.com 404 PID 1772 wrote to memory of 4016 1772 56BB21~1.EXE 446 PID 1772 wrote to memory of 4016 1772 56BB21~1.EXE 446 PID 1772 wrote to memory of 4016 1772 56BB21~1.EXE 446 PID 4016 wrote to memory of 4368 4016 svchost.com 427 PID 4016 wrote to memory of 4368 4016 svchost.com 427 PID 4016 wrote to memory of 4368 4016 svchost.com 427 PID 4368 wrote to memory of 1688 4368 56BB21~1.EXE 106 PID 4368 wrote to memory of 1688 4368 56BB21~1.EXE 106 PID 4368 wrote to memory of 1688 4368 56BB21~1.EXE 106 PID 1688 wrote to memory of 3008 1688 svchost.com 434 PID 1688 wrote to memory of 3008 1688 svchost.com 434 PID 1688 wrote to memory of 3008 1688 svchost.com 434 PID 3008 wrote to memory of 1364 3008 56BB21~1.EXE 485 PID 3008 wrote to memory of 1364 3008 56BB21~1.EXE 485 PID 3008 wrote to memory of 1364 3008 56BB21~1.EXE 485 PID 1364 wrote to memory of 4896 1364 svchost.com 109 PID 1364 wrote to memory of 4896 1364 svchost.com 109 PID 1364 wrote to memory of 4896 1364 svchost.com 109 PID 4896 wrote to memory of 3332 4896 56BB21~1.EXE 110 PID 4896 wrote to memory of 3332 4896 56BB21~1.EXE 110 PID 4896 wrote to memory of 3332 4896 56BB21~1.EXE 110 PID 3332 wrote to memory of 4392 3332 svchost.com 489 PID 3332 wrote to memory of 4392 3332 svchost.com 489 PID 3332 wrote to memory of 4392 3332 svchost.com 489 PID 4392 wrote to memory of 3956 4392 56BB21~1.EXE 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe"C:\Users\Admin\AppData\Local\Temp\56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\56bb21f18d9d0a767df04c4a2d0bc0c38e327b63a08dc1679f167a370aacaf44.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"15⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"21⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"23⤵
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE24⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"25⤵
- Executes dropped EXE
PID:3644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE26⤵
- Executes dropped EXE
PID:4260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"27⤵
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE28⤵
- Executes dropped EXE
PID:1640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"29⤵
- Executes dropped EXE
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE30⤵
- Executes dropped EXE
PID:1980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"31⤵
- Executes dropped EXE
PID:848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE32⤵
- Executes dropped EXE
PID:2884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"33⤵
- Executes dropped EXE
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE34⤵
- Executes dropped EXE
PID:4368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"35⤵
- Executes dropped EXE
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE36⤵
- Executes dropped EXE
- Modifies registry class
PID:1064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"37⤵
- Executes dropped EXE
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"39⤵
- Executes dropped EXE
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE40⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE42⤵
- Executes dropped EXE
PID:5108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"43⤵
- Executes dropped EXE
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE44⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"45⤵
- Executes dropped EXE
PID:116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE46⤵
- Executes dropped EXE
PID:2796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"47⤵
- Executes dropped EXE
PID:4344 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE48⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"49⤵
- Executes dropped EXE
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2200 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"51⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE52⤵
- Executes dropped EXE
PID:4000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"53⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE54⤵
- Executes dropped EXE
PID:2928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"55⤵
- Executes dropped EXE
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
PID:2352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"57⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"59⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE60⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"61⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE62⤵
- Executes dropped EXE
PID:3464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"63⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
PID:1348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"65⤵
- Executes dropped EXE
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE66⤵PID:5060
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"67⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE68⤵PID:3836
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"69⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE70⤵PID:2756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"71⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE72⤵PID:2340
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"73⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE74⤵PID:2304
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"75⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE76⤵PID:2500
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"77⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE78⤵
- Checks computer location settings
PID:876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"79⤵
- Drops file in Windows directory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE80⤵PID:2280
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"81⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE82⤵
- Drops file in Windows directory
PID:3488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"83⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE84⤵
- Modifies registry class
PID:3316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"85⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE86⤵PID:2224
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"87⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE88⤵
- Checks computer location settings
- Modifies registry class
PID:3340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"89⤵PID:3160
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE90⤵
- Modifies registry class
PID:4400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"91⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE92⤵
- Drops file in Windows directory
PID:2900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"93⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE94⤵PID:3332
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"95⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE96⤵PID:3752
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"97⤵PID:668
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE98⤵PID:1536
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"99⤵
- Drops file in Windows directory
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE100⤵PID:2796
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"101⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE102⤵PID:4768
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"103⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE104⤵PID:1664
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"105⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE106⤵PID:4984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"107⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE108⤵PID:1640
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"109⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE110⤵PID:3384
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"111⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE112⤵PID:3604
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"113⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE114⤵PID:4840
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"115⤵PID:3436
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE116⤵PID:1688
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"117⤵PID:4080
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE118⤵PID:4408
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"119⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE120⤵PID:4920
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE"121⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\56BB21~1.EXE122⤵
- Modifies registry class
PID:460
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-