Malware Analysis Report

2024-11-16 12:20

Sample ID 240416-mtardaac5z
Target 424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d
SHA256 424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d
Tags
neshta persistence spyware stealer
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral4

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral5

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral3

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d

Threat Level: Known bad

The file 424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d was found to be: Known bad.

Malicious Activity Summary

neshta persistence spyware stealer

Neshta family

Detect Neshta payload

Neshta

Reads user/profile data of web browsers

Checks computer location settings

Loads dropped DLL

Modifies system executable filetype association

Executes dropped EXE

Adds Run key to start application

Drops file in Program Files directory

Drops file in Windows directory

Enumerates physical storage devices

Unsigned PE

Suspicious use of SetWindowsHookEx

Suspicious behavior: AddClipboardFormatListener

Suspicious use of WriteProcessMemory

Checks processor information in registry

Modifies registry class

Modifies Internet Explorer settings

Enumerates system info in registry

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-04-16 10:44

Signatures

Detect Neshta payload

Description Indicator Process Target
N/A N/A N/A N/A

Neshta family

neshta

Unsigned PE

Description Indicator Process Target
N/A N/A N/A N/A

Analysis: behavioral4

Detonation Overview

Submitted

2024-04-16 10:44

Reported

2024-04-16 10:50

Platform

win10v2004-20240412-en

Max time kernel

293s

Max time network

225s

Command Line

"C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

Signatures

Detect Neshta payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Neshta

persistence spyware neshta

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000\Control Panel\International\Geo\Nation C:\ProgramData\Synaptics\Synaptics.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\SYNAPT~1\SYNAPT~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.29\MI391D~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.29\MICROS~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.29\MIA062~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\MicrosoftEdgeUpdate.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\SYNAPT~1\SYNAPT~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13185~1.29\MICROS~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A
File opened for modification C:\Windows\directx.sys C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\ProgramData\Synaptics\Synaptics.exe N/A
Key created \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
Key created \REGISTRY\USER\S-1-5-21-355664440-2199602304-1223909400-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4588 wrote to memory of 3568 N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 4588 wrote to memory of 3568 N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 4588 wrote to memory of 3568 N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 3568 wrote to memory of 2832 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 3568 wrote to memory of 2832 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 3568 wrote to memory of 2832 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 3568 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 3568 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 3568 wrote to memory of 4776 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 2832 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Windows\svchost.com
PID 2832 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Windows\svchost.com
PID 2832 wrote to memory of 320 N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Windows\svchost.com
PID 320 wrote to memory of 2292 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
PID 320 wrote to memory of 2292 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
PID 320 wrote to memory of 2292 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
PID 4776 wrote to memory of 628 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 4776 wrote to memory of 628 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 4776 wrote to memory of 628 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 628 wrote to memory of 4640 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Windows\svchost.com
PID 628 wrote to memory of 4640 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Windows\svchost.com
PID 628 wrote to memory of 4640 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Windows\svchost.com
PID 4640 wrote to memory of 2320 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
PID 4640 wrote to memory of 2320 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
PID 4640 wrote to memory of 2320 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

"C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

"C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

"C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

C:\ProgramData\Synaptics\Synaptics.exe

"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE

C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate

Network

Country Destination Domain Proto
US 8.8.8.8:53 76.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 9.228.82.20.in-addr.arpa udp
US 8.8.8.8:53 241.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 21.114.53.23.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 xred.mooo.com udp
US 8.8.8.8:53 freedns.afraid.org udp
US 69.42.215.252:80 freedns.afraid.org tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 88.156.103.20.in-addr.arpa udp
US 8.8.8.8:53 252.215.42.69.in-addr.arpa udp
NL 23.62.61.75:443 www.bing.com tcp
US 8.8.8.8:53 75.61.62.23.in-addr.arpa udp
US 8.8.8.8:53 157.123.68.40.in-addr.arpa udp
US 8.8.8.8:53 56.126.166.20.in-addr.arpa udp
US 8.8.8.8:53 17.143.109.104.in-addr.arpa udp
US 8.8.8.8:53 docs.google.com udp
GB 216.58.201.110:443 docs.google.com tcp
US 8.8.8.8:53 110.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 3.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 drive.usercontent.google.com udp
GB 142.250.187.193:443 drive.usercontent.google.com tcp
US 8.8.8.8:53 193.187.250.142.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

MD5 7067d1cea6555b1aa1688e667d841ed0
SHA1 5dc8040e57fe06220a9d2635ba3f67778038ecd9
SHA256 9f73f83363cc2bbcb7723be5bc250737cac6b6ed5f9d534e9842a4df38a6b3ec
SHA512 04201fed409e264aa341bdd132402a54aa953bb93fa2e8cd20f8a6d94c6b65b4e180b64ad8170bd3ecd21a1060ed369cb91acfbf3005de1beb0d8da63555b919

memory/3568-12-0x0000000002770000-0x0000000002771000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

MD5 253c5affc95591159aa639ee93e29df1
SHA1 61894f2fb132a27f7d24b38c2757cf4931e843a8
SHA256 584de44e6778caaabc2986161c5ff740e85caf7b9ec8b927a6ef3ab00ce86d30
SHA512 026ab53ca9c417c23eb27f7a55530312f310dbd20b27c706b46f248e6418cece0051cd532cbdf73b14c8eb2c1ba2e01fb17f7da264e41986fe6fc2123d42dc02

memory/3568-114-0x0000000000400000-0x00000000008D5000-memory.dmp

memory/4776-115-0x0000000000A90000-0x0000000000A91000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\3582-490\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

MD5 07244a2c002ffdf1986b454429eace0b
SHA1 d7cd121caac2f5989aa68a052f638f82d4566328
SHA256 e9522e6912a0124c0a8c9ff9bb3712b474971376a4eb4ca614bb1664a2b4abcf
SHA512 4a09db85202723a73703c5926921fef60c3dddae21528a01936987306c5e7937463f94a2f4a922811de1f76621def2a8a597a8b38a719dd24e6ff3d4e07492ca

C:\Windows\svchost.com

MD5 0be604ce6cb13ac46c5f5fa37c9abb41
SHA1 1c4a555867778586b2727fa6f7331510b93234a8
SHA256 efb23890eba9d105120819fe1c25da2e314a9e10618aa2dd40a97c8a9dd79bdd
SHA512 06cdf862c495b99520e946b59a8721bfa4d89be284bcf9c155a38a1b25c281cc4d580d2af791034ef6c04c4a677ecaa56205ba21d740980d7985d45432038f21

memory/320-130-0x0000000000400000-0x000000000041B000-memory.dmp

C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE

MD5 39c8a4c2c3984b64b701b85cb724533b
SHA1 c911f4c4070dfe9a35d9adcb7de6e6fb1482ce00
SHA256 888a1dd0033e5d758a4e731e3e55357de866e80d03b1b194375f714e1fd4351d
SHA512 f42ca2962fe60cff1a13dea8b81ff0647b317c785ee4f5159c38487c34d33aecba8478757047d31ab2ee893fbdcb91a21655353456ba6a018fc71b2278db4db2

C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE

MD5 92dc0a5b61c98ac6ca3c9e09711e0a5d
SHA1 f809f50cfdfbc469561bced921d0bad343a0d7b4
SHA256 3e9da97a7106122245e77f13f3f3cc96c055d732ab841eb848d03ac25401c1bc
SHA512 d9eefb19f82e0786d9be0dbe5e339d25473fb3a09682f40c6d190d4c320cca5556abb72b5d97c6b0da4f8faefdc6d39ac9d0415fdf94ebcc90ecdf2e513c6a31

C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE

MD5 8c753d6448183dea5269445738486e01
SHA1 ebbbdc0022ca7487cd6294714cd3fbcb70923af9
SHA256 473eb551101caeaf2d18f811342e21de323c8dd19ed21011997716871defe997
SHA512 4f6fddefc42455540448eac0b693a4847e21b68467486376a4186776bfe137337733d3075b7b87ed7dac532478dc9afc63883607ec8205df3f155fee64c7a9be

C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe

MD5 cce8964848413b49f18a44da9cb0a79b
SHA1 0b7452100d400acebb1c1887542f322a92cbd7ae
SHA256 fe44ca8d5050932851aa54c23133277e66db939501af58e5aeb7b67ec1dde7b5
SHA512 bf8fc270229d46a083ced30da6637f3ca510b0ce44624a9b21ec6aacac81666dffd41855053a936aa9e8ea6e745a09b820b506ec7bf1173b6f1837828a35103d

C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE

MD5 09acdc5bbec5a47e8ae47f4a348541e2
SHA1 658f64967b2a9372c1c0bdd59c6fb2a18301d891
SHA256 1b5c715d71384f043843ea1785a6873a9f39d2daae112ccdeffcd88b10a3a403
SHA512 3867bf98e1a0e253114a98b78b047b0d8282b5abf4aaf836f31cc0e26224e2a1b802c65df9d90dc7696a6dbcb9a8e4b900f1d1299e1b11e36f095ebaf8a2e5b8

C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe

MD5 576410de51e63c3b5442540c8fdacbee
SHA1 8de673b679e0fee6e460cbf4f21ab728e41e0973
SHA256 3f00404dd591c2856e6f71bd78423ed47199902e0b85f228e6c4de72c59ddffe
SHA512 f7761f3878775b30cc3d756fa122e74548dfc0a27e38fa4109e34a59a009df333d074bf14a227549ae347605f271be47984c55148685faac479aeb481f7191db

C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

MD5 3b73078a714bf61d1c19ebc3afc0e454
SHA1 9abeabd74613a2f533e2244c9ee6f967188e4e7e
SHA256 ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29
SHA512 75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe

MD5 8ffc3bdf4a1903d9e28b99d1643fc9c7
SHA1 919ba8594db0ae245a8abd80f9f3698826fc6fe5
SHA256 8268d3fefe8ca96a25a73690d14bacf644170ab5e9e70d2f8eeb350a4c83f9f6
SHA512 0b94ead97374d74eaee87e7614ddd3911d2cf66d4c49abbfd06b02c03e5dd56fd00993b4947e8a4bcd9d891fa39cab18cc6b61efc7d0812e91eb3aea9cd1a427

C:\Windows\directx.sys

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/4640-203-0x0000000000400000-0x000000000041B000-memory.dmp

memory/628-201-0x0000000000400000-0x000000000041B000-memory.dmp

C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe

MD5 a3f4ef782456e99a755b7d3a60bafc00
SHA1 bf30e8e09c243b6a5426bd57642dd7a5437a882f
SHA256 78f8e2c27bad901097539e4afe1874b467d7a46098299e576742fb57fb76bbfd
SHA512 297923aa17f4390a75322adebfd750f7b9258ead50d41f3b525177cebf94f058ba2c0e70db1f51fc6dcd2722566799cd17bd66b81205f329c47bc0ca1011c178

C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe

MD5 028aea45f143a63ba70146a4abe2ceeb
SHA1 c616258da4d8a7c9ff7dd5fff089d983d1553e09
SHA256 adc7b8fc26491206149496e2bceaf3686424274f444f14e2dd6fbf2ac7423ddf
SHA512 a266d0e2fd2676db41317622938cc03ff33c1904129d4ba0ef2d97a88313c882e719c8d4798c18a97ca64bc5ebdb90dd05290f25569e967966e2f5399f1f511d

C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe

MD5 9a8d683f9f884ddd9160a5912ca06995
SHA1 98dc8682a0c44727ee039298665f5d95b057c854
SHA256 5e2e22ead49ce9cc11141dbeebbe5b93a530c966695d8efc2083f00e6be53423
SHA512 6aecf8c5cb5796d6879f8643e20c653f58bad70820896b0019c39623604d5b3c8a4420562ab051c6685edce60aa068d9c2dbb4413a7b16c6d01a9ac10dc22c12

C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe

MD5 d722ea08b4e55dbfca956d34b7fef6e2
SHA1 69119f4475fc6f7fd1f749c52b03cc49adf50014
SHA256 9fc432a9ce058ba19348e5918a716db8d429cfd87ae51deccc220ff5d2a9708c
SHA512 11bc7e857aeabbc3c914da0d00cdc34fe3cd42ebea22a3c688985dda1b94095ba634a3bc1c9d1e0a808f8be42f1d754233ab963d123329066b9e0cb6f3c3719a

C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE

MD5 cbd96ba6abe7564cb5980502eec0b5f6
SHA1 74e1fe1429cec3e91f55364e5cb8385a64bb0006
SHA256 405b8bd647fa703e233b8b609a18999abe465a8458168f1daf23197bd2ea36aa
SHA512 a551001853f6b93dfbc6cf6a681820af31330a19d5411076ff3dbce90937b3d92173085a15f29ebf56f2ef12a4e86860ac6723ebc89c98ea31ea7a6c7e3d7cdc

C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE

MD5 400836f307cf7dbfb469cefd3b0391e7
SHA1 7af3cbb12d3b2d8b5d9553c687c6129d1dd90a10
SHA256 cb5c5abb625a812d47007c75e3855be3f29da527a41cf03730ad5c81f3eb629a
SHA512 aa53cb304478585d6f83b19a6de4a7938ba2570d380a565a56ff5365aed073d5f56b95ad3228eb7d1e7e6110c6172a58b97bd6a5e57e4a8d39e762ed31dc17c8

C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE

MD5 5da33a7b7941c4e76208ee7cddec8e0b
SHA1 cdd2e7b9b0e4be68417d4618e20a8283887c489c
SHA256 531e735e4e8940dfe21e30be0d4179ceaecb57ce431cf63c5044e07048ac1751
SHA512 977aeecfbc693c9d5746fedf08b99e0b0f6fd7b0c7b41ac2b34a832e68a2e6f3c68f38af2e65c87075fcf00c1c6103e34324df45d7da9412cbbeea7e410794b6

C:\PROGRA~2\Google\Update\DISABL~1.EXE

MD5 3b0e91f9bb6c1f38f7b058c91300e582
SHA1 6e2e650941b1a96bb0bb19ff26a5d304bb09df5f
SHA256 57c993cadf4bf84810cea23a7112c6e260624beaab48d0e4332d3462900fec1d
SHA512 a4fbe28a0135f4632e0a5b6bd775f8d010250b0fbfe223db1fe81d18552a6bc166ebce807853ba02e6a476e9829454805e415ca828a5e043bd1e63dc53599d0f

C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE

MD5 f7c714dbf8e08ca2ed1a2bfb8ca97668
SHA1 cc78bf232157f98b68b8d81327f9f826dabb18ab
SHA256 fc379fda348644fef660a3796861c122aa2dd5498e80279d1279a7ddb259e899
SHA512 28bc04c4df3f632865e68e83d045b3ecd2a263e62853c922b260d0734026e8a1541988fcbf4ddc9cf3aba6863214d6c6eb51f8bbb2586122a7cb01a70f08d16c

C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE

MD5 7c73e01bd682dc67ef2fbb679be99866
SHA1 ad3834bd9f95f8bf64eb5be0a610427940407117
SHA256 da333c92fdfd2e8092f5b56686b94f713f8fa27ef8f333e7222259ad1eb08f5d
SHA512 b2f3398e486cde482cb6bea18f4e5312fa2db7382ca25cea17bcba5ab1ff0e891d59328bc567641a9da05caca4d7c61dc102289d46e7135f947ce6155e295711

C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe

MD5 452c3ce70edba3c6e358fad9fb47eb4c
SHA1 d24ea3b642f385a666159ef4c39714bec2b08636
SHA256 da73b6e071788372702104b9c72b6697e84e7c75e248e964996700b77c6b6f1c
SHA512 fe8a0b9b1386d6931dc7b646d0dd99c3d1b44bd40698b33077e7eeba877b53e5cb39ff2aa0f6919ccab62953a674577bc1b2516d9cadc0c051009b2083a08085

C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE

MD5 301d7f5daa3b48c83df5f6b35de99982
SHA1 17e68d91f3ec1eabde1451351cc690a1978d2cd4
SHA256 abe398284d90be5e5e78f98654b88664e2e14478f7eb3f55c5fd1c1bcf1bebee
SHA512 4a72a24dec461d116fe8324c651913273ccaa50cb036ccdacb3ae300e417cf4a64aa458869b8d2f3b4c298c59977437d11b241d08b391a481c3226954bba22e4

C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE

MD5 bcd0f32f28d3c2ba8f53d1052d05252d
SHA1 c29b4591df930dabc1a4bd0fa2c0ad91500eafb2
SHA256 bb07d817b8b1b6b4c25e62b6120e51dec10118557d7b6b696ad084a5ba5bfdeb
SHA512 79f407735853f82f46870c52058ceee4d91857a89db14868ee1169abd5c0fd2e3fa1ed230ab90b5f479a9581b88998643d69b0df498defea29e73b0d487f3b10

C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE

MD5 a5d9eaa7d52bffc494a5f58203c6c1b5
SHA1 97928ba7b61b46a1a77a38445679d040ffca7cc8
SHA256 34b8662d38e7d3d6394fa6c965d943d2c82ea06ba9d7a0af4f8e0571fb5a9c48
SHA512 b6fdc8389bb4d736d608600469be6a4b0452aa3ea082f9a0791022a14c02b8fb7dcd62df133b0518e91283094eaba2be9318316f72d2c4aae6286d3e8686e787

C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE

MD5 eb008f1890fed6dc7d13a25ff9c35724
SHA1 751d3b944f160b1f77c1c8852af25b65ae9d649c
SHA256 a9b7b9155af49d651b092bb1665447059f7a1d0061f88fa320d4f956b9723090
SHA512 9cfe3480f24bf8970ad5773cb9df51d132ee90ada35cbf8ec1222e09a60ae46b2ff4b96862fea19085b1c32f93c47c69f604589fa3f4af17e5d67bef893b6bf1

C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE

MD5 5c78384d8eb1f6cb8cb23d515cfe7c98
SHA1 b732ab6c3fbf2ded8a4d6c8962554d119f59082e
SHA256 9abd7f0aa942ee6b263cdc4b32a4110ddb95e43ad411190f0ea48c0064884564
SHA512 99324af5f8fb70a9d01f97d845a4c6999053d6567ba5b80830a843a1634b02eaf3c0c04ced924cf1b1be9b4d1dbbcb95538385f7f85ad84d3eaaa6dcdebcc8a6

C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe

MD5 5119e350591269f44f732b470024bb7c
SHA1 4ccd48e4c6ba6e162d1520760ee3063e93e2c014
SHA256 2b3aa9642b291932ba7f9f3d85221402a9d27078f56ef0e9c6bca633616e3873
SHA512 599b4ec673169d42a348d1117737b4ad4d7539574153df5a5c7689130c9ac5ff5cd00f3c8ec39adf32ff2b56be074081efcabb6456272c649703c3ea6cdaded4

C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE

MD5 380d6bf6345e63b70140beb7364b0b15
SHA1 ee14f61511dbc7d9b6920f1c78c8a57709931ed7
SHA256 162fa0da2e043f0939b8956baf4ed10e71390c2c0574ac94516b64636bcbb0f5
SHA512 7ee6644ddfce7a25fdc5164ae622264965d783b634c675043caf9ca9efbbb0898f753745b334cf6632d69f2482f59043936a904e445e33d8a7c8952d8d95fa51

C:\PROGRA~2\MICROS~1\EDGEUP~1\Download\{F3C4F~1\13185~1.29\MICROS~1.EXE

MD5 9ef85205eb899a7e83c308335f6e246e
SHA1 556970538cd24405ba3978271bbf726324474e25
SHA256 ddfc82e56d811be331815e303b6ae3e56470b4e7cc3f06112e485d8c16b3840c
SHA512 7380513958d5b07fcb30de2806218e4e74c90d34d007ba316f54b94c8259d79dd63575142f12b5f481bda11d0a5ff1b473566da73066441e9b0fab60f35251d9

C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe

MD5 05bdfd8a3128ab14d96818f43ebe9c0e
SHA1 495cbbd020391e05d11c52aa23bdae7b89532eb7
SHA256 7b945c7e6b8bfbb489f003ecd1d0dcd4803042003de4646d4206114361a0fbbb
SHA512 8d9b9fc407986bd53fe3b56c96b7371cc782b4bac705253bfb0a2b0b1e6883fdb022f1ac87b8bfd7005291991b6a3dfbaceab54f5d494e0af70f0435a0b8b0da

C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE

MD5 0d9146d70ac6a41ead1ea2d50d729508
SHA1 b9e6ff83a26aaf105640f5d5cdab213c989dc370
SHA256 0b876ddeefd88d5e98de7e409c5b6546ba8ffa195c168f9a4b6ba33b44d437ab
SHA512 c9394decfd469bfedd883095d604e11208aa290334ff5c0dce852f2ca74fba27c37ba2984dab8b27430e573681e22c9f903e53b01510a4b77d337cbd92c56cb3

C:\Users\ALLUSE~1\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE

MD5 63dc05e27a0b43bf25f151751b481b8c
SHA1 b20321483dac62bce0aa0cef1d193d247747e189
SHA256 7d607fb69c69a72a5bf4305599279f46318312ce1082b6a34ac9100b8c7762ce
SHA512 374d705704d456cc5f9f79b7f465f6ec7c775dc43001c840e9d6efbbdef20926ed1fa97f8a9b1e73161e17f72520b96c05fa58ac86b3945208b405f9166e7ba3

C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE

MD5 91490c78c45cbd686ac759b6a252e898
SHA1 51bb6c5aa14cf478b0b6fa0329c7366d1f6fb480
SHA256 47f3331b4f35012d38bc11cdeae0ff7b4ae1186d4e916e3e48a9440438296821
SHA512 f7d44cd6df2c0c492731c14ca27e26605e8cddb9cb9287bf083fe1e43f753cafa11c341f0915510ad1d189466e92bb3f4e219b3599e9df72878bde14518bee35

C:\Users\ALLUSE~1\PACKAG~1\{EF5AF~1\WINDOW~1.EXE

MD5 0a95f10b9844e1232d124ad02c29f847
SHA1 3379e8af13238397a096c2a840592c23eb3a2ffc
SHA256 a33fe9874b5f7c03f49b8b881046f131ff6a1fdf1f4386508bf679649d12d713
SHA512 38f280a010ad11da57b940e1a2808be944f202f585243f8e897685f8a19cdcb6477feb3516133ffd5f92841c51f89fb0cd9046eb55780385f51e36d9a565a968

C:\Users\ALLUSE~1\PACKAG~1\{D87AE~1\WINDOW~1.EXE

MD5 9a7c11d9f727d37020573ae369f6b9d4
SHA1 7a61c673ed8df9142379ec56731d22d53e873f57
SHA256 b2275f16535fe7f0344459527c7582ab4c10b1586b9e27bbd2812b9447c3b5e8
SHA512 f99ea58d22f17a298a9d9afc3aec3df230d287a1c48c0457e4c1523d47f89353e112edcc4376e8cda1923b94e043f9ffd4c4110fd5e465613e2202a4cc777888

C:\Users\ALLUSE~1\PACKAG~1\{61087~1\VCREDI~1.EXE

MD5 7a36ae2055dc8aa5791f86a0583197b4
SHA1 deade87912580a5386096768f569781a92dbb9d4
SHA256 64d1449187d26e3b769300335ed0fc5d31e2a2ee2264774ea9da2c396a6d8328
SHA512 e042b3338617366afa3bbcd0f589f632a63567149b78172acb16524b6c488c10649578416f992146b70506fc55f3a9a79624bb87aac21fa80658afc5b5693680

C:\Users\ALLUSE~1\PACKAG~1\{57A73~1\VC_RED~1.EXE

MD5 4cf3954a39b7e27f364cbb5e58a3a957
SHA1 4498a5dea907da2b85e30bf6a1ebddfbaba2eb18
SHA256 f24a6d80aff3ee9ee65a609376d1aa3fdb3a034847ebbc0e4e65ff20ab0893fb
SHA512 d7dd8c5ad15dda561ae309fbf18e5ad2e852e951e937ea062cc0cb035df74ecb5a9aa636c6813aef37271268cedb1b3c5d39a8b6519fd54f5346445a2a9ef57d

C:\Users\ALLUSE~1\PACKAG~1\{4D8DC~1\VC_RED~1.EXE

MD5 97510a7d9bf0811a6ea89fad85a9f3f3
SHA1 2ac0c49b66a92789be65580a38ae9798237711db
SHA256 c48abbc29405559e68cc9f8fc6d218aa317a9d0023839c7846ca509c1f563fea
SHA512 2a93e2a3bd187fdde160f87ef777ccd1d1c398d547b7c869e6b64469b9418ad04d887cdfe94af7407476377bf2d009f576de3935c025b7aefbab26fbcd8f90fb

C:\Users\ALLUSE~1\PACKAG~1\{63880~1\WINDOW~1.EXE

MD5 65a0db3bdbb321e4215c250b48423254
SHA1 07a1eb51d3015cc0fbaccccaae83e082fe06669a
SHA256 2a52e13b1615130e3b6dd66015ea45e639ee687ddf027d3a55943c3bd624926f
SHA512 f4b8d5adfa7df845796db8a72200127e56add98c6f4a0cad827aefcfada580a3cfc1dc2c9a575b4fea8993937866fffffaefbafe5165608b4975efd0e802b46b

C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE

MD5 86749cd13537a694795be5d87ef7106d
SHA1 538030845680a8be8219618daee29e368dc1e06c
SHA256 8c35dcc975a5c7c687686a3970306452476d17a89787bc5bd3bf21b9de0d36a5
SHA512 7b6ae20515fb6b13701df422cbb0844d26c8a98087b2758427781f0bf11eb9ec5da029096e42960bf99ddd3d4f817db6e29ac172039110df6ea92547d331db4c

memory/2832-326-0x0000000000400000-0x000000000041B000-memory.dmp

memory/4776-327-0x0000000000400000-0x00000000008D5000-memory.dmp

memory/4588-325-0x0000000000400000-0x000000000041B000-memory.dmp

memory/4588-328-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2832-329-0x0000000000400000-0x000000000041B000-memory.dmp

memory/4776-331-0x0000000000A90000-0x0000000000A91000-memory.dmp

memory/4588-332-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2832-333-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp5023.tmp

MD5 4013adf3f873db98e24f5f31f6a3a2f3
SHA1 2eda723ddc5ea11b491d5e93b210abe053d1b633
SHA256 24bef83fbbb65b5ba6ede3cf2cc75b341e90c08134ee0729247e533d73117fc4
SHA512 f27bd23b4130a2ac62b0e387a389898945bc40af111270a3bef877e3d8653c5a7337c751488323696b3a03dfe2da000d676e98be1b110bde5ffc51dff0ce6e9a

memory/4588-339-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2832-338-0x0000000000400000-0x000000000041B000-memory.dmp

memory/4776-346-0x0000000000400000-0x00000000008D5000-memory.dmp

memory/4776-362-0x0000000000400000-0x00000000008D5000-memory.dmp

Analysis: behavioral5

Detonation Overview

Submitted

2024-04-16 10:44

Reported

2024-04-16 10:50

Platform

win11-20240412-en

Max time kernel

293s

Max time network

279s

Command Line

"C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

Signatures

Detect Neshta payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Neshta

persistence spyware neshta

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge_proxy.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\pwahelper.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateSetup.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\cookie_exporter.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge_proxy.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateOnDemand.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateComRegisterShell64.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateCore.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge_pwa_launcher.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateBroker.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\pwahelper.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\notification_helper.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeComRegisterShellARM64.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedgewebview2.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdate.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A
File opened for modification C:\Windows\directx.sys C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\ProgramData\Synaptics\Synaptics.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3777591257-2471171023-3629228286-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 1964 wrote to memory of 4524 N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 1964 wrote to memory of 4524 N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 1964 wrote to memory of 4524 N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 4524 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 4524 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 4524 wrote to memory of 1268 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 1268 wrote to memory of 764 N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Windows\svchost.com
PID 1268 wrote to memory of 764 N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Windows\svchost.com
PID 1268 wrote to memory of 764 N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Windows\svchost.com
PID 4524 wrote to memory of 2100 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 4524 wrote to memory of 2100 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 4524 wrote to memory of 2100 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 764 wrote to memory of 4272 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
PID 764 wrote to memory of 4272 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
PID 764 wrote to memory of 4272 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
PID 2100 wrote to memory of 808 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 2100 wrote to memory of 808 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 2100 wrote to memory of 808 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 808 wrote to memory of 3740 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Windows\svchost.com
PID 808 wrote to memory of 3740 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Windows\svchost.com
PID 808 wrote to memory of 3740 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Windows\svchost.com
PID 3740 wrote to memory of 2692 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
PID 3740 wrote to memory of 2692 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
PID 3740 wrote to memory of 2692 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

"C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

"C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

"C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

C:\ProgramData\Synaptics\Synaptics.exe

"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE

C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate

Network

Country Destination Domain Proto
US 8.8.8.8:53 xred.mooo.com udp
US 69.42.215.252:80 freedns.afraid.org tcp
N/A 224.0.0.251:5353 udp
US 8.8.8.8:53 98.56.20.217.in-addr.arpa udp
NL 23.62.61.96:443 www.bing.com tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
US 204.79.197.200:443 tse1.mm.bing.net tcp
GB 216.58.201.110:443 docs.google.com tcp
GB 142.250.187.193:443 drive.usercontent.google.com tcp
US 8.8.8.8:53 110.201.58.216.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

MD5 7067d1cea6555b1aa1688e667d841ed0
SHA1 5dc8040e57fe06220a9d2635ba3f67778038ecd9
SHA256 9f73f83363cc2bbcb7723be5bc250737cac6b6ed5f9d534e9842a4df38a6b3ec
SHA512 04201fed409e264aa341bdd132402a54aa953bb93fa2e8cd20f8a6d94c6b65b4e180b64ad8170bd3ecd21a1060ed369cb91acfbf3005de1beb0d8da63555b919

memory/4524-12-0x0000000000BE0000-0x0000000000BE1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

MD5 253c5affc95591159aa639ee93e29df1
SHA1 61894f2fb132a27f7d24b38c2757cf4931e843a8
SHA256 584de44e6778caaabc2986161c5ff740e85caf7b9ec8b927a6ef3ab00ce86d30
SHA512 026ab53ca9c417c23eb27f7a55530312f310dbd20b27c706b46f248e6418cece0051cd532cbdf73b14c8eb2c1ba2e01fb17f7da264e41986fe6fc2123d42dc02

C:\Users\Admin\AppData\Local\Temp\3582-490\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

MD5 07244a2c002ffdf1986b454429eace0b
SHA1 d7cd121caac2f5989aa68a052f638f82d4566328
SHA256 e9522e6912a0124c0a8c9ff9bb3712b474971376a4eb4ca614bb1664a2b4abcf
SHA512 4a09db85202723a73703c5926921fef60c3dddae21528a01936987306c5e7937463f94a2f4a922811de1f76621def2a8a597a8b38a719dd24e6ff3d4e07492ca

memory/4524-125-0x0000000000400000-0x00000000008D5000-memory.dmp

memory/764-126-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Windows\svchost.com

MD5 0be604ce6cb13ac46c5f5fa37c9abb41
SHA1 1c4a555867778586b2727fa6f7331510b93234a8
SHA256 efb23890eba9d105120819fe1c25da2e314a9e10618aa2dd40a97c8a9dd79bdd
SHA512 06cdf862c495b99520e946b59a8721bfa4d89be284bcf9c155a38a1b25c281cc4d580d2af791034ef6c04c4a677ecaa56205ba21d740980d7985d45432038f21

memory/2100-128-0x0000000002510000-0x0000000002511000-memory.dmp

C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe

MD5 8ffc3bdf4a1903d9e28b99d1643fc9c7
SHA1 919ba8594db0ae245a8abd80f9f3698826fc6fe5
SHA256 8268d3fefe8ca96a25a73690d14bacf644170ab5e9e70d2f8eeb350a4c83f9f6
SHA512 0b94ead97374d74eaee87e7614ddd3911d2cf66d4c49abbfd06b02c03e5dd56fd00993b4947e8a4bcd9d891fa39cab18cc6b61efc7d0812e91eb3aea9cd1a427

C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE

MD5 8c753d6448183dea5269445738486e01
SHA1 ebbbdc0022ca7487cd6294714cd3fbcb70923af9
SHA256 473eb551101caeaf2d18f811342e21de323c8dd19ed21011997716871defe997
SHA512 4f6fddefc42455540448eac0b693a4847e21b68467486376a4186776bfe137337733d3075b7b87ed7dac532478dc9afc63883607ec8205df3f155fee64c7a9be

C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE

MD5 4ddc609ae13a777493f3eeda70a81d40
SHA1 8957c390f9b2c136d37190e32bccae3ae671c80a
SHA256 16d65f2463658a72dba205dcaa18bc3d0bab4453e726233d68bc176e69db0950
SHA512 9d7f90d1529cab20078c2690bf7bffab5a451a41d8993781effe807e619da0e7292f991da2f0c5c131b111d028b3e6084e5648c90816e74dfb664e7f78181bc5

C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe

MD5 5791075058b526842f4601c46abd59f5
SHA1 b2748f7542e2eebcd0353c3720d92bbffad8678f
SHA256 5c3ef3ec7594c040146e908014791dd15201ba58b4d70032770bb661b6a0e394
SHA512 83e303971ed64019fde9e4ba6f6e889f8fb105088490dfa7dcf579a12baff20ef491f563d132d60c7b24a4fd3cac29bd9dc974571cd162000fae8fba4e0e54fb

C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE

MD5 9dfcdd1ab508b26917bb2461488d8605
SHA1 4ba6342bcf4942ade05fb12db83da89dc8c56a21
SHA256 ecd5e94da88c653e4c34b6ab325e0aca8824247b290336f75c410caa16381bc5
SHA512 1afc1b95f160333f1ff2fa14b3f22a28ae33850699c6b5498915a8b6bec1cfc40f33cb69583240aa9206bc2ea7ab14e05e071275b836502a92aa8c529fc1b137

C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe

MD5 cce8964848413b49f18a44da9cb0a79b
SHA1 0b7452100d400acebb1c1887542f322a92cbd7ae
SHA256 fe44ca8d5050932851aa54c23133277e66db939501af58e5aeb7b67ec1dde7b5
SHA512 bf8fc270229d46a083ced30da6637f3ca510b0ce44624a9b21ec6aacac81666dffd41855053a936aa9e8ea6e745a09b820b506ec7bf1173b6f1837828a35103d

C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE

MD5 3b35b268659965ab93b6ee42f8193395
SHA1 8faefc346e99c9b2488f2414234c9e4740b96d88
SHA256 750824b5f75c91a6c2eeb8c5e60ae28d7a81e323d3762c8652255bfea5cba0bb
SHA512 035259a7598584ddb770db3da4e066b64dc65638501cdd8ff9f8e2646f23b76e3dfffa1fb5ed57c9bd15bb4efa3f7dd33fdc2e769e5cc195c25de0e340eb89ab

C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe

MD5 028aea45f143a63ba70146a4abe2ceeb
SHA1 c616258da4d8a7c9ff7dd5fff089d983d1553e09
SHA256 adc7b8fc26491206149496e2bceaf3686424274f444f14e2dd6fbf2ac7423ddf
SHA512 a266d0e2fd2676db41317622938cc03ff33c1904129d4ba0ef2d97a88313c882e719c8d4798c18a97ca64bc5ebdb90dd05290f25569e967966e2f5399f1f511d

C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe

MD5 9a8d683f9f884ddd9160a5912ca06995
SHA1 98dc8682a0c44727ee039298665f5d95b057c854
SHA256 5e2e22ead49ce9cc11141dbeebbe5b93a530c966695d8efc2083f00e6be53423
SHA512 6aecf8c5cb5796d6879f8643e20c653f58bad70820896b0019c39623604d5b3c8a4420562ab051c6685edce60aa068d9c2dbb4413a7b16c6d01a9ac10dc22c12

C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaws.exe

MD5 452c3ce70edba3c6e358fad9fb47eb4c
SHA1 d24ea3b642f385a666159ef4c39714bec2b08636
SHA256 da73b6e071788372702104b9c72b6697e84e7c75e248e964996700b77c6b6f1c
SHA512 fe8a0b9b1386d6931dc7b646d0dd99c3d1b44bd40698b33077e7eeba877b53e5cb39ff2aa0f6919ccab62953a674577bc1b2516d9cadc0c051009b2083a08085

C:\Windows\directx.sys

MD5 6b3bfceb3942a9508a2148acbee89007
SHA1 3622ac7466cc40f50515eb6fcdc15d1f34ad3be3
SHA256 e0a7bae2a9ac263cff5d725922e40272d8854278d901233a93a5267859c00a3c
SHA512 fa222bfcade636824af32124b45450c92b1abec7a33e6e647a9248eef5371c127d22ccb7cc5a096b4d5d52e2457f3841293a1b34304e8e5523549856ac02f224

memory/3740-246-0x0000000000400000-0x000000000041B000-memory.dmp

C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedgewebview2.exe

MD5 fccf74c2b9b3e8af2814e8b6493eeb93
SHA1 74ea75ba393e718e802e84060c74780d5e38bae5
SHA256 8c2ffa56077b4d79db8118b544f095faf4803dbe5676af3f0d9ac52b15d73724
SHA512 909f02d7f14e08078275f492ae5df978d6e81e57d15e95083d8bc23631aa6d720088eefdbe60173db6dca3485d00c599937b42262f2c8e395a4fce84222c9dcb

C:\PROGRA~2\MICROS~1\Edge\Application\msedge.exe

MD5 88bec53e56a6b3121e0574d1c663d067
SHA1 681608f0cadf80ba96652b9c488516caf70e7b0f
SHA256 c6fbfeeee15a2fe7302a80fd5e679cec3212f4eb1a92ef14dd7f19a19a107299
SHA512 c60926f095fb4bd4ddd351d61e412eca97246f8dce14c655c9a54741c078fcb1380730758ca4d35a84da968b4284c8787ab10dc3884adf5e5f8cba58db2adde3

C:\PROGRA~2\MICROS~1\EdgeWebView\Application\90.0.818.66\msedge_pwa_launcher.exe

MD5 34d0a4d388738301876a910823dfcb8a
SHA1 46849a3f21432aceb23b403ce4a3625a45d1b7d2
SHA256 dbb4397b616325e5484d4d26836d4e1da826e83be51b1ebf59c758bf5bd58a34
SHA512 ed65ecca79d99824d289bba7e77dd714087ad34536aaf95648b31d93d28d5ecb8b42c776332651c98ffb02c18a9b9e792f0293ded46051ff4def050efeb95c3e

C:\PROGRA~2\MICROS~1\EdgeCore\90.0.818.66\msedge_proxy.exe

MD5 93945da60d2b0236b39233e90eef7ad8
SHA1 b84c25eb36def2bd640d3d7dc5076c3a4d4f3e8a
SHA256 cc71bf809ea635d2074c41c7bc4a1685a3aaf6a4b7264be7b8c268ca4b9e113c
SHA512 1af87f6cc481f8558f74a330f3adaf6b94a431367d3cb02c463d5203a39a0259236ee95bbabe1f2d6dfd59a2c657199633ff45f794a50a50c1ba5be8d3c50e47

C:\PROGRA~2\MICROS~1\Edge\Application\pwahelper.exe

MD5 ae233c9a94ac29078a9b84a0e2f21d0e
SHA1 74352f8a9f95dac8d4149592f2ca5cafa3f22df5
SHA256 d351a76537354ee30c5c229ce5ad7684befc6aeac30dbf8c38c03f7780c9ab87
SHA512 4985561bd596b002849f3c840b04b5443385f3eb6ba3e1016090a6623b61b0143c4cc928f2b5aa95a70fda8363359ebbdcdd89a5521e90e93aa1c17903ac4109

C:\PROGRA~2\MICROS~1\Edge\Application\msedge_proxy.exe

MD5 a504bdfc2f71c8040cb5b6c743d32f34
SHA1 e693d0844f6a6c7d82a70e289f99c62a216dd13a
SHA256 8ba67958788de5da6de9288f1bb6d2b73f57cc88534359a9a627063e86fcb076
SHA512 0ac11251e930ffb1ca965c7f584fcd64d9a2432e248b6d98847e10b67c80482a0591f663f046b7d6add34160bc2deedaf89313a5a6f2cccfa395264c193c4f89

C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\notification_helper.exe

MD5 40309a97594ecfed9e8cd0368b51f002
SHA1 8a1ca73a3ee107c1f172877a21f2e8b6a5c30f54
SHA256 48e26052483e4981461c09644924f28464019919cc740cece6069adb71c3be48
SHA512 359d44547d0cb2c5fa403cc2e1e860bd502db6066a6e09871a047edfaa4ee9449415cbe6ce32a13eb3276fa7f13bd4397572a4439989b080aa4c3ff1c8adcbca

C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\Installer\setup.exe

MD5 4df2f346ca3852b5dff45c058d22eab3
SHA1 7724a7e7cb09d79a44104e694d06999c225e5f2a
SHA256 59c94097f063a245ebce78f2e63354bb94f12f3faf10a7800381e20a249d0132
SHA512 746dcad9a5febe85202061583d9c241bee8c1375fa01735dcc200050fe685f9e04ba97f4ccc86802bafe5b0b9f56534adb5f4262a5db7b468e8014a3a70af735

C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\identity_helper.exe

MD5 105512023f579c681bbf55f4f88a2ded
SHA1 2b7e3fb82461924e2afa09cf778da484605cb855
SHA256 bbdb39a2dec157d2a571101338907d3ce6b6b4122ee077644cd1285ccb0515b0
SHA512 0aeacf1bd617722c29dcd763208c20e89d90cff4c43a478f1292ef0964a3172fcc22cc2b1850ec68981c4760674e68f804bf3bba2155d9bbf9c7aa38f7394985

C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE

MD5 63dc05e27a0b43bf25f151751b481b8c
SHA1 b20321483dac62bce0aa0cef1d193d247747e189
SHA256 7d607fb69c69a72a5bf4305599279f46318312ce1082b6a34ac9100b8c7762ce
SHA512 374d705704d456cc5f9f79b7f465f6ec7c775dc43001c840e9d6efbbdef20926ed1fa97f8a9b1e73161e17f72520b96c05fa58ac86b3945208b405f9166e7ba3

C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE

MD5 9597098cfbc45fae685d9480d135ed13
SHA1 84401f03a7942a7e4fcd26e4414b227edd9b0f09
SHA256 45966655baaed42df92cd6d8094b4172c0e7a0320528b59cf63fca7c25d66e9c
SHA512 16afbdffe4b4b2e54b4cc96fe74e49ca367dea50752321ddf334756519812ba8ce147ef5459e421dc42e103bc3456aab1d185588cc86b35fa2315ac86b2a0164

C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE

MD5 9c10a5ec52c145d340df7eafdb69c478
SHA1 57f3d99e41d123ad5f185fc21454367a7285db42
SHA256 ccf37e88447a7afdb0ba4351b8c5606dbb05b984fb133194d71bcc00d7be4e36
SHA512 2704cfd1a708bfca6db7c52467d3abf0b09313db0cdd1ea8e5d48504c8240c4bf24e677f17c5df9e3ac1f6a678e0328e73e951dc4481f35027cb03b2966dc38f

C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE

MD5 97510a7d9bf0811a6ea89fad85a9f3f3
SHA1 2ac0c49b66a92789be65580a38ae9798237711db
SHA256 c48abbc29405559e68cc9f8fc6d218aa317a9d0023839c7846ca509c1f563fea
SHA512 2a93e2a3bd187fdde160f87ef777ccd1d1c398d547b7c869e6b64469b9418ad04d887cdfe94af7407476377bf2d009f576de3935c025b7aefbab26fbcd8f90fb

C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE

MD5 86749cd13537a694795be5d87ef7106d
SHA1 538030845680a8be8219618daee29e368dc1e06c
SHA256 8c35dcc975a5c7c687686a3970306452476d17a89787bc5bd3bf21b9de0d36a5
SHA512 7b6ae20515fb6b13701df422cbb0844d26c8a98087b2758427781f0bf11eb9ec5da029096e42960bf99ddd3d4f817db6e29ac172039110df6ea92547d331db4c

C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe

MD5 05bdfd8a3128ab14d96818f43ebe9c0e
SHA1 495cbbd020391e05d11c52aa23bdae7b89532eb7
SHA256 7b945c7e6b8bfbb489f003ecd1d0dcd4803042003de4646d4206114361a0fbbb
SHA512 8d9b9fc407986bd53fe3b56c96b7371cc782b4bac705253bfb0a2b0b1e6883fdb022f1ac87b8bfd7005291991b6a3dfbaceab54f5d494e0af70f0435a0b8b0da

C:\PROGRA~2\MOZILL~1\UNINST~1.EXE

MD5 9cc8047a7f7963378556e4de802b0a7d
SHA1 e8b64a0be5eb3d465a259c1211dd8d1d62202dd8
SHA256 aac915fbd1808bab7670e4a143642ca857a4c4ffe3f9bc0999ffb5b9f566bd65
SHA512 260334d4f2967cf52ccf2ad21a346a3ae38d39a07f58188588f55285d58a904afd3b8c1ee7a9d86d1010b90b1fbcfc19f30074f803bf356cb8ee2ebc62fd35c5

C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE

MD5 99ac881582035c636c2359fcc7c72b71
SHA1 34e222ce94d0fb0cbfe61e7e37d527c01a413e5e
SHA256 8aa538991767d32b538ad399c1e2af1e536ab9fc04ca70f13c0728347f404753
SHA512 44bd12f2e8da0bd02c0348720bc73d00823ab9bb6a5ef7eba1881dacf0817c37d763b0cc3ab201e958822220ecc4d93a871ca693bb0f6ed95c1b26eb7a00d6f2

C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateSetup.exe

MD5 4e53c18875eae1d86001eb7062816bdf
SHA1 dcace17a70e0c8baf661de66db11d8d547d8bdd6
SHA256 7a189d655bc0f0f203556143b0a869d3e58f62ef78a670e15da578cd525bd84c
SHA512 5c02d06d1a80d61dda79544419ca0093c6f42ffea065b3ee2a3f7f9e688a0ceac02eef4fd78e552662a3348b6c969dbfc066c1678ad3ccead2bca8a77cd16dcb

C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateOnDemand.exe

MD5 3d13bdb98b3c19709efcd345d8fd59b4
SHA1 53f5d91bf81a45a5a20d7f3671f31f306754cf2e
SHA256 1cb45e4404fed0ded0bfe7acd8e7c26beff744e0f157e5321d1e7192a4cd33d7
SHA512 319b24eecf06a3ff982b695d3e2dffe45ccdf4bbb1975a8de541c61590e6a87dc3f48cef4befb454110fc364d82bd9a9be2d694c4603a63b1892bd9fc19313cc

C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateCore.exe

MD5 9f742c7e0eca1dd773df895cbdd2b8ab
SHA1 2f0977e3da4564adc67e23fe0d8ad648a998fb21
SHA256 7690edb96e306a365a3b70a01061b27ba6617b6aa19ed9a44e246b90388db83f
SHA512 a9e14debecef621085584fd9e65f5140bdac5d437f62f4873ab7886ecac9d01a95cd11e766b6656451dce2353d7b340a944da4d5d824be5a3b444879a64af4ac

C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateComRegisterShell64.exe

MD5 25b132b0ef2aa14ceba30092c2659be6
SHA1 aeff839c1dfa56d5dcbd6e5b4e7232e3c364ef78
SHA256 7c9bd83409f49cf3e25c407d0847dc141c92b18437a2c32f2d29e255780c24e5
SHA512 17a138269b039f7d73f7b79bc05c75ca49f73359a59c6329c72e0613f54fcd152b3d952423a23bd26797ecf35f4ca6921ef4af3151c88fac25f28104e1011988

C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateBroker.exe

MD5 d75525435aa7684c170c5dc2da79cbd4
SHA1 4db21157c85b98229bd03f6d61fa1bbcaac38cca
SHA256 837aa78c2b5ee6cd161e4020d288d2b46bc380890b5e7070f07252974fdb7190
SHA512 ad7d4e5613a62ceaf8465c2b0e75437fe390532677a444a969b3338868d592e8a43eccd4b25de6828554234d81957baeee4f75c3ff004aa080f821c82f574456

C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdate.exe

MD5 8276a426ba43984a9f339e6451aedbb3
SHA1 00965ad5ed1578cb220d1f024ab51ee048d0d9fc
SHA256 81df1bd3d6a8fbc580ad8b7d1c40aa92851b49eae10f1f6920f096b76524a4e9
SHA512 b0cb4576a2cbf8f7c0b293f06eb5dcffd1d14c32f4603820a73ee2736263c06afc980547e2bfefa80ca27a37a7a316eb433151fe441651ea2e1b8e9fe564ffc3

C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeComRegisterShellARM64.exe

MD5 0a56ae9287a690aac4c2b0e66307d64f
SHA1 b8b1b2ca1c3e1fc50decc309cbd83caf4ee8c8f7
SHA256 06ed4addcca437139ecdee0ea7307c83dda2438daf183e1161648ddf74e15975
SHA512 61cce3293c7b4b6e659f9b99d40cea5302f62bb8a332d45d1690bc129c72bf2a48ed779215c387268dbcee7a727900ffeaffcc16f7ffdb9b8bc1a0ea15e413b5

C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\elevation_service.exe

MD5 7e37d766247059f57b1749cc981dae75
SHA1 3c97628e79d241dac9c9275ea4137f97c215a142
SHA256 4b681840018519bd755191705a1e0330557a33943f165f80a01fda3641db4cd3
SHA512 a924960c22a5246024ace05c76b54f6db3be3ea6bbb08b4c12fad5379dba7b5c4bb0f5deece37b01f908ef876dbf616dc808d5d2f734867698a24f49c5c1e3f2

C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\cookie_exporter.exe

MD5 b9c69481857d7550c5ebd77cc50a1d84
SHA1 a2e18198fd96975f9f3206330af9a933e336ddc1
SHA256 3f3063f7da14b31417aa8dbc0e5242a50a29f7948cd1288e0647d9f927129123
SHA512 cb1c02d0aa19210835ab584bdd49fbb9c446bd793d4c0e68f0a0f04f6a5c7e0f595009d544120e71a641f9776c39b17d7c0c5fea76392581f6aa094cd6fb4647

C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\BHO\ie_to_edge_stub.exe

MD5 23622b7d65653e1dd46db1d10c52d933
SHA1 5278e3311ef9adac97bcd572ef4466161deb921d
SHA256 6e872df59c1f0f474f5f2e1bacd84b8570b08195fe5615a7293eecf540f88505
SHA512 8b2a0c9f71baa78fbe30c82a2f530faf106adabe366200555891af3ea5b52ca327f05e8f53c55d73d94c08fc60433218235b638b0ada1617ee57668087966b26

C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE

MD5 f7c714dbf8e08ca2ed1a2bfb8ca97668
SHA1 cc78bf232157f98b68b8d81327f9f826dabb18ab
SHA256 fc379fda348644fef660a3796861c122aa2dd5498e80279d1279a7ddb259e899
SHA512 28bc04c4df3f632865e68e83d045b3ecd2a263e62853c922b260d0734026e8a1541988fcbf4ddc9cf3aba6863214d6c6eb51f8bbb2586122a7cb01a70f08d16c

C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE

MD5 25e165d6a9c6c0c77ee1f94c9e58754b
SHA1 9b614c1280c75d058508bba2a468f376444b10c1
SHA256 8bbe59987228dd9ab297f9ea34143ea1e926bfb19f3d81c2904ab877f31e1217
SHA512 7d55c7d86ccabb6e9769ebca44764f4d89e221d5756e5c5d211e52c271e3ce222df90bc9938248e2e210d6695f30f6280d929d19ef41c09d3ea31688ae24d4bf

C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE

MD5 e5589ec1e4edb74cc7facdaac2acabfd
SHA1 9b12220318e848ed87bb7604d6f6f5df5dbc6b3f
SHA256 6ce92587a138ec07dac387a294d0bbe8ab629599d1a2868d2afaccea3b245d67
SHA512 f36ab33894681f51b9cec7ea5a738eb081a56bcd7625bdd2f5ef2c084e4beb7378be8f292af3aeae79d9317ba57cc41df89f00aef52e58987bdb2eac3f48171a

C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE

MD5 96a14f39834c93363eebf40ae941242c
SHA1 5a3a676403d4e6ad0a51d0f0e2bbdd636ae5d6fc
SHA256 8ee4aa23eb92c4aba9a46b18ac249a5fa11c5abb7e2c1ca82cd5196401db790a
SHA512 fbf307a8053e9478a52cfdf8e8bad3d7c6664c893458786ae6ee4fffc6fe93006e99a2a60c97fb62dad1addd5247621517f4edee5d9545717c4587a272cef9a2

C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE

MD5 3b0e91f9bb6c1f38f7b058c91300e582
SHA1 6e2e650941b1a96bb0bb19ff26a5d304bb09df5f
SHA256 57c993cadf4bf84810cea23a7112c6e260624beaab48d0e4332d3462900fec1d
SHA512 a4fbe28a0135f4632e0a5b6bd775f8d010250b0fbfe223db1fe81d18552a6bc166ebce807853ba02e6a476e9829454805e415ca828a5e043bd1e63dc53599d0f

C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE

MD5 400836f307cf7dbfb469cefd3b0391e7
SHA1 7af3cbb12d3b2d8b5d9553c687c6129d1dd90a10
SHA256 cb5c5abb625a812d47007c75e3855be3f29da527a41cf03730ad5c81f3eb629a
SHA512 aa53cb304478585d6f83b19a6de4a7938ba2570d380a565a56ff5365aed073d5f56b95ad3228eb7d1e7e6110c6172a58b97bd6a5e57e4a8d39e762ed31dc17c8

C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe

MD5 892cf4fc5398e07bf652c50ef2aa3b88
SHA1 c399e55756b23938057a0ecae597bd9dbe481866
SHA256 e2262c798729169f697e6c30e5211cde604fd8b14769311ff4ea81abba8c2781
SHA512 f16a9e4b1150098c5936ec6107c36d47246dafd5a43e9f4ad9a31ecab69cc789c768691fa23a1440fae7f6e93e8e62566b5c86f7ed6bb4cfe26368149ea8c167

memory/808-206-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Windows\directx.sys

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

memory/1964-311-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1268-312-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2100-313-0x0000000000400000-0x00000000008D5000-memory.dmp

memory/1964-314-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1268-315-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1964-320-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1268-319-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2100-321-0x0000000002510000-0x0000000002511000-memory.dmp

memory/2100-345-0x0000000000400000-0x00000000008D5000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-04-16 10:44

Reported

2024-04-16 10:50

Platform

win10-20240404-en

Max time kernel

299s

Max time network

292s

Command Line

"C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

Signatures

Detect Neshta payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Neshta

persistence spyware neshta

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-3727096518-2913484142-3593445157-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-3727096518-2913484142-3593445157-1000\Control Panel\International\Geo\Nation C:\ProgramData\Synaptics\Synaptics.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\WinMail.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\ACCESS~1\wordpad.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\ACCESS~1\wordpad.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\SYNAPT~1\SYNAPT~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\WinMail.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A
File opened for modification C:\Windows\directx.sys C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A

Enumerates physical storage devices

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3727096518-2913484142-3593445157-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance C:\ProgramData\Synaptics\Synaptics.exe N/A
Key created \REGISTRY\USER\S-1-5-21-3727096518-2913484142-3593445157-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 3004 wrote to memory of 4596 N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 3004 wrote to memory of 4596 N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 3004 wrote to memory of 4596 N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 4596 wrote to memory of 3292 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 4596 wrote to memory of 3292 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 4596 wrote to memory of 3292 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 3292 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Windows\svchost.com
PID 3292 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Windows\svchost.com
PID 3292 wrote to memory of 3456 N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Windows\svchost.com
PID 3456 wrote to memory of 4380 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
PID 3456 wrote to memory of 4380 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
PID 3456 wrote to memory of 4380 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
PID 4596 wrote to memory of 1532 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 4596 wrote to memory of 1532 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 4596 wrote to memory of 1532 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 1532 wrote to memory of 4364 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 1532 wrote to memory of 4364 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 1532 wrote to memory of 4364 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 4364 wrote to memory of 4672 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Windows\svchost.com
PID 4364 wrote to memory of 4672 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Windows\svchost.com
PID 4364 wrote to memory of 4672 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Windows\svchost.com
PID 4672 wrote to memory of 4664 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
PID 4672 wrote to memory of 4664 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
PID 4672 wrote to memory of 4664 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

"C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

"C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

"C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE

C:\ProgramData\Synaptics\Synaptics.exe

"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate

C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate

Network

Country Destination Domain Proto
US 8.8.8.8:53 xred.mooo.com udp
US 8.8.8.8:53 freedns.afraid.org udp
US 69.42.215.252:80 freedns.afraid.org tcp
US 8.8.8.8:53 252.215.42.69.in-addr.arpa udp
NL 52.111.243.29:443 tcp
US 8.8.8.8:53 docs.google.com udp
GB 216.58.201.110:443 docs.google.com tcp
US 8.8.8.8:53 110.201.58.216.in-addr.arpa udp
US 8.8.8.8:53 240.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 3.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 drive.usercontent.google.com udp
GB 142.250.187.193:443 drive.usercontent.google.com tcp
US 8.8.8.8:53 193.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 22.236.111.52.in-addr.arpa udp
US 8.8.8.8:53 205.201.50.20.in-addr.arpa udp
US 8.8.8.8:53 43.56.20.217.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

MD5 7067d1cea6555b1aa1688e667d841ed0
SHA1 5dc8040e57fe06220a9d2635ba3f67778038ecd9
SHA256 9f73f83363cc2bbcb7723be5bc250737cac6b6ed5f9d534e9842a4df38a6b3ec
SHA512 04201fed409e264aa341bdd132402a54aa953bb93fa2e8cd20f8a6d94c6b65b4e180b64ad8170bd3ecd21a1060ed369cb91acfbf3005de1beb0d8da63555b919

memory/4596-6-0x0000000000BA0000-0x0000000000BA1000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

MD5 253c5affc95591159aa639ee93e29df1
SHA1 61894f2fb132a27f7d24b38c2757cf4931e843a8
SHA256 584de44e6778caaabc2986161c5ff740e85caf7b9ec8b927a6ef3ab00ce86d30
SHA512 026ab53ca9c417c23eb27f7a55530312f310dbd20b27c706b46f248e6418cece0051cd532cbdf73b14c8eb2c1ba2e01fb17f7da264e41986fe6fc2123d42dc02

C:\Windows\svchost.com

MD5 0be604ce6cb13ac46c5f5fa37c9abb41
SHA1 1c4a555867778586b2727fa6f7331510b93234a8
SHA256 efb23890eba9d105120819fe1c25da2e314a9e10618aa2dd40a97c8a9dd79bdd
SHA512 06cdf862c495b99520e946b59a8721bfa4d89be284bcf9c155a38a1b25c281cc4d580d2af791034ef6c04c4a677ecaa56205ba21d740980d7985d45432038f21

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE

MD5 07244a2c002ffdf1986b454429eace0b
SHA1 d7cd121caac2f5989aa68a052f638f82d4566328
SHA256 e9522e6912a0124c0a8c9ff9bb3712b474971376a4eb4ca614bb1664a2b4abcf
SHA512 4a09db85202723a73703c5926921fef60c3dddae21528a01936987306c5e7937463f94a2f4a922811de1f76621def2a8a597a8b38a719dd24e6ff3d4e07492ca

memory/3456-93-0x0000000000400000-0x000000000041B000-memory.dmp

C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE

MD5 8c753d6448183dea5269445738486e01
SHA1 ebbbdc0022ca7487cd6294714cd3fbcb70923af9
SHA256 473eb551101caeaf2d18f811342e21de323c8dd19ed21011997716871defe997
SHA512 4f6fddefc42455540448eac0b693a4847e21b68467486376a4186776bfe137337733d3075b7b87ed7dac532478dc9afc63883607ec8205df3f155fee64c7a9be

C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE

MD5 176436d406fd1aabebae353963b3ebcf
SHA1 9ffdfdb8cc832a0c6501c4c0e85b23a0f7eff57a
SHA256 2f947e3ca624ce7373080b4a3934e21644fb070a53feeaae442b15b849c2954f
SHA512 a2d1a714e0c1e5463260c64048ba8fd5064cfa06d4a43d02fc04a30748102ff5ba86d20a08e611e200dc778e2b7b3ae808da48132a05a61aa09ac424a182a06a

C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE

MD5 12c29dd57aa69f45ddd2e47620e0a8d9
SHA1 ba297aa3fe237ca916257bc46370b360a2db2223
SHA256 22a585c183e27b3c732028ff193733c2f9d03700a0e95e65c556b0592c43d880
SHA512 255176cd1a88dfa2af3838769cc20dc7ad9d969344801f07b9ebb372c12cee3f47f2dba3559f391deab10650875cad245d9724acfa23a42b336bfa96559a5488

C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE

MD5 92dc0a5b61c98ac6ca3c9e09711e0a5d
SHA1 f809f50cfdfbc469561bced921d0bad343a0d7b4
SHA256 3e9da97a7106122245e77f13f3f3cc96c055d732ab841eb848d03ac25401c1bc
SHA512 d9eefb19f82e0786d9be0dbe5e339d25473fb3a09682f40c6d190d4c320cca5556abb72b5d97c6b0da4f8faefdc6d39ac9d0415fdf94ebcc90ecdf2e513c6a31

C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE

MD5 4ddc609ae13a777493f3eeda70a81d40
SHA1 8957c390f9b2c136d37190e32bccae3ae671c80a
SHA256 16d65f2463658a72dba205dcaa18bc3d0bab4453e726233d68bc176e69db0950
SHA512 9d7f90d1529cab20078c2690bf7bffab5a451a41d8993781effe807e619da0e7292f991da2f0c5c131b111d028b3e6084e5648c90816e74dfb664e7f78181bc5

C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe

MD5 5791075058b526842f4601c46abd59f5
SHA1 b2748f7542e2eebcd0353c3720d92bbffad8678f
SHA256 5c3ef3ec7594c040146e908014791dd15201ba58b4d70032770bb661b6a0e394
SHA512 83e303971ed64019fde9e4ba6f6e889f8fb105088490dfa7dcf579a12baff20ef491f563d132d60c7b24a4fd3cac29bd9dc974571cd162000fae8fba4e0e54fb

C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE

MD5 9dfcdd1ab508b26917bb2461488d8605
SHA1 4ba6342bcf4942ade05fb12db83da89dc8c56a21
SHA256 ecd5e94da88c653e4c34b6ab325e0aca8824247b290336f75c410caa16381bc5
SHA512 1afc1b95f160333f1ff2fa14b3f22a28ae33850699c6b5498915a8b6bec1cfc40f33cb69583240aa9206bc2ea7ab14e05e071275b836502a92aa8c529fc1b137

C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe

MD5 cce8964848413b49f18a44da9cb0a79b
SHA1 0b7452100d400acebb1c1887542f322a92cbd7ae
SHA256 fe44ca8d5050932851aa54c23133277e66db939501af58e5aeb7b67ec1dde7b5
SHA512 bf8fc270229d46a083ced30da6637f3ca510b0ce44624a9b21ec6aacac81666dffd41855053a936aa9e8ea6e745a09b820b506ec7bf1173b6f1837828a35103d

C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE

MD5 09acdc5bbec5a47e8ae47f4a348541e2
SHA1 658f64967b2a9372c1c0bdd59c6fb2a18301d891
SHA256 1b5c715d71384f043843ea1785a6873a9f39d2daae112ccdeffcd88b10a3a403
SHA512 3867bf98e1a0e253114a98b78b047b0d8282b5abf4aaf836f31cc0e26224e2a1b802c65df9d90dc7696a6dbcb9a8e4b900f1d1299e1b11e36f095ebaf8a2e5b8

C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe

MD5 576410de51e63c3b5442540c8fdacbee
SHA1 8de673b679e0fee6e460cbf4f21ab728e41e0973
SHA256 3f00404dd591c2856e6f71bd78423ed47199902e0b85f228e6c4de72c59ddffe
SHA512 f7761f3878775b30cc3d756fa122e74548dfc0a27e38fa4109e34a59a009df333d074bf14a227549ae347605f271be47984c55148685faac479aeb481f7191db

C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE

MD5 3b73078a714bf61d1c19ebc3afc0e454
SHA1 9abeabd74613a2f533e2244c9ee6f967188e4e7e
SHA256 ded54d1fcca07b6bff2bc3b9a1131eac29ff1f836e5d7a7c5c325ec5abe96e29
SHA512 75959d4e8a7649c3268b551a2a378e6d27c0bfb03d2422ebeeb67b0a3f78c079473214057518930f2d72773ce79b106fd2d78405e8e3d8883459dcbb49c163c4

C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe

MD5 8ffc3bdf4a1903d9e28b99d1643fc9c7
SHA1 919ba8594db0ae245a8abd80f9f3698826fc6fe5
SHA256 8268d3fefe8ca96a25a73690d14bacf644170ab5e9e70d2f8eeb350a4c83f9f6
SHA512 0b94ead97374d74eaee87e7614ddd3911d2cf66d4c49abbfd06b02c03e5dd56fd00993b4947e8a4bcd9d891fa39cab18cc6b61efc7d0812e91eb3aea9cd1a427

memory/4596-137-0x0000000000400000-0x00000000008D5000-memory.dmp

memory/1532-140-0x00000000023F0000-0x00000000023F1000-memory.dmp

C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe

MD5 322302633e36360a24252f6291cdfc91
SHA1 238ed62353776c646957efefc0174c545c2afa3d
SHA256 31da9632f5d25806b77b617d48da52a14afc574bbe1653120f97705284ea566c
SHA512 5a1f7c44ce7f5036bffc18ebac39e2bf70e6f35fa252617d665b26448f4c4473adfa115467b7e2d9b7068823e448f74410cdcdfef1ac1c09021e051921787373

C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe

MD5 9a8d683f9f884ddd9160a5912ca06995
SHA1 98dc8682a0c44727ee039298665f5d95b057c854
SHA256 5e2e22ead49ce9cc11141dbeebbe5b93a530c966695d8efc2083f00e6be53423
SHA512 6aecf8c5cb5796d6879f8643e20c653f58bad70820896b0019c39623604d5b3c8a4420562ab051c6685edce60aa068d9c2dbb4413a7b16c6d01a9ac10dc22c12

C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE

MD5 cbd96ba6abe7564cb5980502eec0b5f6
SHA1 74e1fe1429cec3e91f55364e5cb8385a64bb0006
SHA256 405b8bd647fa703e233b8b609a18999abe465a8458168f1daf23197bd2ea36aa
SHA512 a551001853f6b93dfbc6cf6a681820af31330a19d5411076ff3dbce90937b3d92173085a15f29ebf56f2ef12a4e86860ac6723ebc89c98ea31ea7a6c7e3d7cdc

C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe

MD5 028aea45f143a63ba70146a4abe2ceeb
SHA1 c616258da4d8a7c9ff7dd5fff089d983d1553e09
SHA256 adc7b8fc26491206149496e2bceaf3686424274f444f14e2dd6fbf2ac7423ddf
SHA512 a266d0e2fd2676db41317622938cc03ff33c1904129d4ba0ef2d97a88313c882e719c8d4798c18a97ca64bc5ebdb90dd05290f25569e967966e2f5399f1f511d

C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe

MD5 d1c48274711d83d4a1a0cfb2abdf8d31
SHA1 b4367dd7201ef0cc22d56613e428efda07da57a8
SHA256 ade1db79870327538841d5470483c6474083f08d871bb7d56cfc9e76971c8640
SHA512 7a3e7927b8be3dc1706e6511bf04475558da076696435f937c4eafa94111c378f3bcaa1ea4e5063e91e3e333c91f086a75baaff6c5cc190d3d314c5eee1687a3

C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe

MD5 ce82862ca68d666d7aa47acc514c3e3d
SHA1 f458c7f43372dbcdac8257b1639e0fe51f592e28
SHA256 c5a99f42100834599e4995d0a178b32b772a6e774a4050a6bb00438af0a6a1f3
SHA512 bca7afd6589c3215c92fdaca552ad3380f53d3db8c4b69329a1fa81528dd952a14bf012321de92ad1d20e5c1888eab3dd512b1ac80a406baccc37ee6ff4a90dc

C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE

MD5 bcd0f32f28d3c2ba8f53d1052d05252d
SHA1 c29b4591df930dabc1a4bd0fa2c0ad91500eafb2
SHA256 bb07d817b8b1b6b4c25e62b6120e51dec10118557d7b6b696ad084a5ba5bfdeb
SHA512 79f407735853f82f46870c52058ceee4d91857a89db14868ee1169abd5c0fd2e3fa1ed230ab90b5f479a9581b88998643d69b0df498defea29e73b0d487f3b10

C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe

MD5 d47ed8961782d9e27f359447fa86c266
SHA1 d37d3f962c8d302b18ec468b4abe94f792f72a3b
SHA256 b1ec065f71cc40f400e006586d370997102860504fd643b235e8ed9f5607262a
SHA512 3e33f2cdf35024868b183449019de9278035e7966b342ba320a6c601b5629792cbb98a19850d4ca80b906c85d10e8503b0193794d1f1efa849fa33d26cff0669

C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE

MD5 3b35b268659965ab93b6ee42f8193395
SHA1 8faefc346e99c9b2488f2414234c9e4740b96d88
SHA256 750824b5f75c91a6c2eeb8c5e60ae28d7a81e323d3762c8652255bfea5cba0bb
SHA512 035259a7598584ddb770db3da4e066b64dc65638501cdd8ff9f8e2646f23b76e3dfffa1fb5ed57c9bd15bb4efa3f7dd33fdc2e769e5cc195c25de0e340eb89ab

C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE

MD5 39c8a4c2c3984b64b701b85cb724533b
SHA1 c911f4c4070dfe9a35d9adcb7de6e6fb1482ce00
SHA256 888a1dd0033e5d758a4e731e3e55357de866e80d03b1b194375f714e1fd4351d
SHA512 f42ca2962fe60cff1a13dea8b81ff0647b317c785ee4f5159c38487c34d33aecba8478757047d31ab2ee893fbdcb91a21655353456ba6a018fc71b2278db4db2

C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaws.exe

MD5 64c5c00694478ff090e483eebcd3d7a1
SHA1 af47eaff535970e6178c1bc29a6eb68b874dcfe8
SHA256 a9884e9141ca6f3d5f9a4fe781b104064f3b801d81263058f23b079c945a12f3
SHA512 4df0b6e2f215ef1dd206e9c14eb233e6896ad9b846290edb344947db8f9bcaec5c39777c9dac33aee85433ed3178188c7622ba8ff0b4d2462a80820f338ca495

C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaw.exe

MD5 892cf4fc5398e07bf652c50ef2aa3b88
SHA1 c399e55756b23938057a0ecae597bd9dbe481866
SHA256 e2262c798729169f697e6c30e5211cde604fd8b14769311ff4ea81abba8c2781
SHA512 f16a9e4b1150098c5936ec6107c36d47246dafd5a43e9f4ad9a31ecab69cc789c768691fa23a1440fae7f6e93e8e62566b5c86f7ed6bb4cfe26368149ea8c167

C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE

MD5 400836f307cf7dbfb469cefd3b0391e7
SHA1 7af3cbb12d3b2d8b5d9553c687c6129d1dd90a10
SHA256 cb5c5abb625a812d47007c75e3855be3f29da527a41cf03730ad5c81f3eb629a
SHA512 aa53cb304478585d6f83b19a6de4a7938ba2570d380a565a56ff5365aed073d5f56b95ad3228eb7d1e7e6110c6172a58b97bd6a5e57e4a8d39e762ed31dc17c8

C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE

MD5 be9c3b0b452c86d8b2bce05106a52f80
SHA1 9f2eefebc7fe6b6fbce8095cb2629208bcf0ee8a
SHA256 af799a1700aeb17b45bb7837e7c462d96bcf30eee0847930ecef6c0872d3601a
SHA512 b77138cc2168b2b282e4bfb1cdce135bfb2c49518c75fc91b0a029a0a39b202a3ea01cfa0d843c30febd5efc6fe3c22437da02f25fd433a28faac6fc95d557ce

C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE

MD5 f7c714dbf8e08ca2ed1a2bfb8ca97668
SHA1 cc78bf232157f98b68b8d81327f9f826dabb18ab
SHA256 fc379fda348644fef660a3796861c122aa2dd5498e80279d1279a7ddb259e899
SHA512 28bc04c4df3f632865e68e83d045b3ecd2a263e62853c922b260d0734026e8a1541988fcbf4ddc9cf3aba6863214d6c6eb51f8bbb2586122a7cb01a70f08d16c

C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE

MD5 e5589ec1e4edb74cc7facdaac2acabfd
SHA1 9b12220318e848ed87bb7604d6f6f5df5dbc6b3f
SHA256 6ce92587a138ec07dac387a294d0bbe8ab629599d1a2868d2afaccea3b245d67
SHA512 f36ab33894681f51b9cec7ea5a738eb081a56bcd7625bdd2f5ef2c084e4beb7378be8f292af3aeae79d9317ba57cc41df89f00aef52e58987bdb2eac3f48171a

C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE

MD5 25e165d6a9c6c0c77ee1f94c9e58754b
SHA1 9b614c1280c75d058508bba2a468f376444b10c1
SHA256 8bbe59987228dd9ab297f9ea34143ea1e926bfb19f3d81c2904ab877f31e1217
SHA512 7d55c7d86ccabb6e9769ebca44764f4d89e221d5756e5c5d211e52c271e3ce222df90bc9938248e2e210d6695f30f6280d929d19ef41c09d3ea31688ae24d4bf

C:\PROGRA~2\MOZILL~1\UNINST~1.EXE

MD5 7e3b8ddfa6bd68ca8f557254c3188aea
SHA1 bafaaaa987c86048b0cf0153e1147e1bbad39b0c
SHA256 8270ecef6079a21f5ae22f1a473e5eb8abac51628367f4acf6466529ba11d7e2
SHA512 675ca07cdb787b3f624eae9707daf519214f8dc4670c524cef5110c9dba197e833cedb051919c757c58a3687e63cf175d1397d8ce69c5995f4eab3b85f6dafbb

C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE

MD5 15163eb05b0a8f65a5ca3c74a658077d
SHA1 8b116062a5754fa2d73fc4df9f635283ae1ccd02
SHA256 8751c43ee0f3f0e080103a9b77be9e79346004769ed43d4cadd630ea15d26dcf
SHA512 a8299e9a522aa58429847920b999598551c1863f63ba473178f61cde43fb91cab6ef62c9e1a51268e54338e012ccfe6428a7c37bc89007d1604fafa2560258c9

memory/4364-225-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Windows\directx.sys

MD5 6b3bfceb3942a9508a2148acbee89007
SHA1 3622ac7466cc40f50515eb6fcdc15d1f34ad3be3
SHA256 e0a7bae2a9ac263cff5d725922e40272d8854278d901233a93a5267859c00a3c
SHA512 fa222bfcade636824af32124b45450c92b1abec7a33e6e647a9248eef5371c127d22ccb7cc5a096b4d5d52e2457f3841293a1b34304e8e5523549856ac02f224

memory/4672-227-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\181510~1.001\FILESY~1.EXE

MD5 f3228c24035b3f54f78bb4fd11c36aeb
SHA1 2fe73d1f64575bc4abf1d47a9dddfe7e2d9c9cbb
SHA256 d2767c9c52835f19f6695c604081bf03cdd772a3731cd2e320d9db5e477d8af7
SHA512 b526c63338d9167060bc40ffa1d13a8c2e871f46680cd4a0efc2333d9f15bf21ae75af45f8932de857678c5bf785011a28862ce7879f4bffdb9753c8bc2c19b5

C:\Users\ALLUSE~1\Adobe\Setup\{AC76B~1\setup.exe

MD5 3bf259392097b2c212b621a52da03706
SHA1 c740b063803008e3d4bab51b8e2719c1f4027bf9
SHA256 79538fa3a6cf33b989d43e7311de4d7b0e1a99b60964e3acc00fa3cb49ff8160
SHA512 186a81ec6cfa4c6dbcb2dc51cbd647bf44328077b58575fafab920303ccf259322cd31fccc0bb23418293f1b88d7f21ab3f0d8e3f9af7db4b5d3f7c8978c7934

C:\Users\ALLUSE~1\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE

MD5 32853955255a94fcd7587ca9cbfe2b60
SHA1 c33a88184c09e89598f0cabf68ce91c8d5791521
SHA256 64df64b39ac4391aea14eb48b0489e6a970a3ea44c02c6a8f10c278cc0636330
SHA512 8566b69668729d70567ff494de8f241329baf2a7748ab0ebf5a53308c3e53e646100af4f6fc33325f3851030d11ff045a7e85e5897008e95c991990d8f80a997

C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE

MD5 86749cd13537a694795be5d87ef7106d
SHA1 538030845680a8be8219618daee29e368dc1e06c
SHA256 8c35dcc975a5c7c687686a3970306452476d17a89787bc5bd3bf21b9de0d36a5
SHA512 7b6ae20515fb6b13701df422cbb0844d26c8a98087b2758427781f0bf11eb9ec5da029096e42960bf99ddd3d4f817db6e29ac172039110df6ea92547d331db4c

C:\Users\ALLUSE~1\PACKAG~1\{57A73~1\VC_RED~1.EXE

MD5 3db4bf90dbae706c47d2323421600d28
SHA1 610e38d5e2e71b582ea2ac2309da9ea5b64999a3
SHA256 8ca4e66b53ca9f10fd589fc2e273077707b24e0f8223a143673125ce45b5e00c
SHA512 edb88cbf54f42a5eab6537972799acdd9ec034b45854fdca9f850111169021d2299683b61fe10302a5d590ca11c1388d1380fa1a1bd44507281e89b373222b8f

C:\Users\ALLUSE~1\PACKAG~1\{4D8DC~1\VC_RED~1.EXE

MD5 97510a7d9bf0811a6ea89fad85a9f3f3
SHA1 2ac0c49b66a92789be65580a38ae9798237711db
SHA256 c48abbc29405559e68cc9f8fc6d218aa317a9d0023839c7846ca509c1f563fea
SHA512 2a93e2a3bd187fdde160f87ef777ccd1d1c398d547b7c869e6b64469b9418ad04d887cdfe94af7407476377bf2d009f576de3935c025b7aefbab26fbcd8f90fb

C:\Users\ALLUSE~1\PACKAG~1\{CA675~1\VCREDI~1.EXE

MD5 87f15006aea3b4433e226882a56f188d
SHA1 e3ad6beb8229af62b0824151dbf546c0506d4f65
SHA256 8d0045c74270281c705009d49441167c8a51ac70b720f84ff941b39fad220919
SHA512 b01a8af6dc836044d2adc6828654fa7a187c3f7ffe2a4db4c73021be6d121f9c1c47b1643513c3f25c0e1b5123b8ce2dc78b2ca8ce638a09c2171f158762c7c1

C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE

MD5 91490c78c45cbd686ac759b6a252e898
SHA1 51bb6c5aa14cf478b0b6fa0329c7366d1f6fb480
SHA256 47f3331b4f35012d38bc11cdeae0ff7b4ae1186d4e916e3e48a9440438296821
SHA512 f7d44cd6df2c0c492731c14ca27e26605e8cddb9cb9287bf083fe1e43f753cafa11c341f0915510ad1d189466e92bb3f4e219b3599e9df72878bde14518bee35

C:\Users\ALLUSE~1\PACKAG~1\{61087~1\VCREDI~1.EXE

MD5 7a36ae2055dc8aa5791f86a0583197b4
SHA1 deade87912580a5386096768f569781a92dbb9d4
SHA256 64d1449187d26e3b769300335ed0fc5d31e2a2ee2264774ea9da2c396a6d8328
SHA512 e042b3338617366afa3bbcd0f589f632a63567149b78172acb16524b6c488c10649578416f992146b70506fc55f3a9a79624bb87aac21fa80658afc5b5693680

memory/3004-257-0x0000000000400000-0x000000000041B000-memory.dmp

memory/3292-258-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1532-259-0x0000000000400000-0x00000000008D5000-memory.dmp

memory/3004-260-0x0000000000400000-0x000000000041B000-memory.dmp

memory/3292-261-0x0000000000400000-0x000000000041B000-memory.dmp

memory/3004-263-0x0000000000400000-0x000000000041B000-memory.dmp

memory/3292-264-0x0000000000400000-0x000000000041B000-memory.dmp

memory/1532-265-0x00000000023F0000-0x00000000023F1000-memory.dmp

memory/3004-267-0x0000000000400000-0x000000000041B000-memory.dmp

memory/3292-268-0x0000000000400000-0x000000000041B000-memory.dmp

memory/3004-274-0x0000000000400000-0x000000000041B000-memory.dmp

memory/3292-273-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp5023.tmp

MD5 a001cf49374009bfc4bc2d22ae4c66a3
SHA1 6306c3504d666f3226c691809f95a45a47477c19
SHA256 26147d71a3a2154ce46dd8872a39b46f6e57943bd15b9612471d7e6200e0ffa2
SHA512 6611750850e22e73cc5d3107cc79e2361192708af484e09e21c928c814f7b2fc2a84a724a9bb6cec2cc371f8fd526822cf1ff7286ba31f874da8f09588e6c467

memory/1532-299-0x0000000000400000-0x00000000008D5000-memory.dmp

Analysis: behavioral2

Detonation Overview

Submitted

2024-04-16 10:44

Reported

2024-04-16 10:50

Platform

win7-20240319-en

Max time kernel

299s

Max time network

249s

Command Line

"C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

Signatures

Detect Neshta payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Neshta

persistence spyware neshta

Loads dropped DLL

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
N/A N/A C:\Windows\svchost.com N/A
N/A N/A C:\Windows\svchost.com N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
N/A N/A C:\ProgramData\Synaptics\Synaptics.exe N/A
N/A N/A C:\ProgramData\Synaptics\Synaptics.exe N/A
N/A N/A C:\ProgramData\Synaptics\Synaptics.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
N/A N/A C:\Windows\svchost.com N/A
N/A N/A C:\Windows\svchost.com N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
N/A N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\SYNAPT~1\SYNAPT~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A
File opened for modification C:\Windows\directx.sys C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A

Enumerates physical storage devices

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\FloatingPointProcessor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Modifies Internet Explorer settings

adware spyware
Description Indicator Process Target
Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\EXCEL.EXE/3000" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel\Contexts = "1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\ = "res://C:\\PROGRA~2\\MICROS~1\\Office14\\ONBttnIE.dll/105" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar\ShowDiscussionButton = "Yes" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\MenuExt\E&xport to Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\COMMAND C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (int) \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\MenuExt\Se&nd to OneNote\Contexts = "55" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\Toolbar C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\ = "&Edit" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\USER\S-1-5-21-2610426812-2871295383-373749122-1000\Software\Microsoft\Internet Explorer\MenuExt C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default MHTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit\COMMAND C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Internet Explorer\Default HTML Editor\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Modifies registry class

Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\ = "&Print" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\DefaultIcon C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ThreadingModel = "Apartment" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\ShellEx C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\ShellEx C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\MSPub.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0045005800430045004c00460069006c00650073003e00560069006a00710042006f006600280059003800270077002100460049006400310067004c00510020002f0064006400650000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\ddeexec\topic C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Word\shell\edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Print\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" /p %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\DefaultIcon C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohtmed.exe\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\WinWord.exe\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b0057004f0052004400460069006c00650073003e00620069002400540021005600210030005a003d007b0050006b00300076006d007e0041005a00750020002f006e002000220025003100220000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec\application\ = "Excel" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Publisher\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\MSPUB.EXE\" %1" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\msohevi.dll" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\command\command = 7800620027004200560035002100210021002100210021002100210021004d004b004b0053006b005000750062005000720069006d006100720079003e00520024006e0075006a0053005700460065003f007d0061004c00720052007000390078004000570020002500310000000000 C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\mhtmlfile\shell\Edit\command C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\WinWord.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\WINWORD.EXE\" /n \"%1\"" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Excel C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Excel.exe\shell\edit\ddeexec C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.htm\OpenWithList\Microsoft Publisher\shell\edit\ = "&Open" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Word C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Edit C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\htmlfile\shell\Print\ = "&Print" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{42042206-2D85-11D3-8CFF-005004838597}\Old Icon\mhtmlfile C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Microsoft Excel\shell\edit\ddeexec C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\command\ = "\"C:\\Program Files (x86)\\Microsoft Office\\Office14\\EXCEL.EXE\" /dde" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.mht\OpenWithList\Excel.exe\shell\edit\ddeexec\topic\ = "system" C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious use of SetWindowsHookEx

Description Indicator Process Target
N/A N/A C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 2180 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 2180 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 2180 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 2180 wrote to memory of 2356 N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 2356 wrote to memory of 2804 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 2356 wrote to memory of 2804 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 2356 wrote to memory of 2804 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 2356 wrote to memory of 2804 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 2804 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Windows\svchost.com
PID 2804 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Windows\svchost.com
PID 2804 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Windows\svchost.com
PID 2804 wrote to memory of 2760 N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Windows\svchost.com
PID 2760 wrote to memory of 2456 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
PID 2760 wrote to memory of 2456 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
PID 2760 wrote to memory of 2456 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
PID 2760 wrote to memory of 2456 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
PID 2356 wrote to memory of 2452 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 2356 wrote to memory of 2452 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 2356 wrote to memory of 2452 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 2356 wrote to memory of 2452 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 2452 wrote to memory of 2004 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 2452 wrote to memory of 2004 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 2452 wrote to memory of 2004 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 2452 wrote to memory of 2004 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 2004 wrote to memory of 1884 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Windows\svchost.com
PID 2004 wrote to memory of 1884 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Windows\svchost.com
PID 2004 wrote to memory of 1884 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Windows\svchost.com
PID 2004 wrote to memory of 1884 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Windows\svchost.com
PID 1884 wrote to memory of 2016 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
PID 1884 wrote to memory of 2016 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
PID 1884 wrote to memory of 2016 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
PID 1884 wrote to memory of 2016 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

"C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

"C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

"C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE

C:\ProgramData\Synaptics\Synaptics.exe

"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate

C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate

C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE

"C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /automation -Embedding

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate

Network

Country Destination Domain Proto
US 8.8.8.8:53 xred.mooo.com udp
US 8.8.8.8:53 freedns.afraid.org udp
US 69.42.215.252:80 freedns.afraid.org tcp
US 8.8.8.8:53 docs.google.com udp
GB 216.58.201.110:443 docs.google.com tcp
US 8.8.8.8:53 drive.usercontent.google.com udp
GB 142.250.187.193:443 drive.usercontent.google.com tcp

Files

\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

MD5 7067d1cea6555b1aa1688e667d841ed0
SHA1 5dc8040e57fe06220a9d2635ba3f67778038ecd9
SHA256 9f73f83363cc2bbcb7723be5bc250737cac6b6ed5f9d534e9842a4df38a6b3ec
SHA512 04201fed409e264aa341bdd132402a54aa953bb93fa2e8cd20f8a6d94c6b65b4e180b64ad8170bd3ecd21a1060ed369cb91acfbf3005de1beb0d8da63555b919

memory/2356-12-0x0000000000220000-0x0000000000221000-memory.dmp

C:\MSOCache\ALLUSE~1\{90140~1\dwtrig20.exe

MD5 cf6c595d3e5e9667667af096762fd9c4
SHA1 9bb44da8d7f6457099cb56e4f7d1026963dce7ce
SHA256 593e60cc30ae0789448547195af77f550387f6648d45847ea244dd0dd7abf03d
SHA512 ff4f789df9e6a6d0fbe12b3250f951fcf11e857906c65e96a30bb46266e7e1180d6103a03db2f3764e0d1346b2de7afba8259ba080057e4a268e45e8654dfa80

\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

MD5 253c5affc95591159aa639ee93e29df1
SHA1 61894f2fb132a27f7d24b38c2757cf4931e843a8
SHA256 584de44e6778caaabc2986161c5ff740e85caf7b9ec8b927a6ef3ab00ce86d30
SHA512 026ab53ca9c417c23eb27f7a55530312f310dbd20b27c706b46f248e6418cece0051cd532cbdf73b14c8eb2c1ba2e01fb17f7da264e41986fe6fc2123d42dc02

C:\Windows\svchost.com

MD5 0be604ce6cb13ac46c5f5fa37c9abb41
SHA1 1c4a555867778586b2727fa6f7331510b93234a8
SHA256 efb23890eba9d105120819fe1c25da2e314a9e10618aa2dd40a97c8a9dd79bdd
SHA512 06cdf862c495b99520e946b59a8721bfa4d89be284bcf9c155a38a1b25c281cc4d580d2af791034ef6c04c4a677ecaa56205ba21d740980d7985d45432038f21

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE

MD5 07244a2c002ffdf1986b454429eace0b
SHA1 d7cd121caac2f5989aa68a052f638f82d4566328
SHA256 e9522e6912a0124c0a8c9ff9bb3712b474971376a4eb4ca614bb1664a2b4abcf
SHA512 4a09db85202723a73703c5926921fef60c3dddae21528a01936987306c5e7937463f94a2f4a922811de1f76621def2a8a597a8b38a719dd24e6ff3d4e07492ca

C:\MSOCache\ALLUSE~1\{90140~1\DW20.EXE

MD5 02ee6a3424782531461fb2f10713d3c1
SHA1 b581a2c365d93ebb629e8363fd9f69afc673123f
SHA256 ead58c483cb20bcd57464f8a4929079539d634f469b213054bf737d227c026dc
SHA512 6c9272cb1b6bde3ee887e1463ab30ea76568cb1a285d11393337b78c4ad1c3b7e6ce47646a92ab6d70bff4b02ab9d699b84af9437b720e52dcd35579fe2693ec

C:\MSOCache\ALLUSE~1\{9A861~1\setup.exe

MD5 566ed4f62fdc96f175afedd811fa0370
SHA1 d4b47adc40e0d5a9391d3f6f2942d1889dd2a451
SHA256 e17cd94c08fc0e001a49f43a0801cea4625fb9aee211b6dfebebec446c21f460
SHA512 cdf8f508d396a1a0d2e0fc25f2ae46398b25039a0dafa0919737cc44e3e926ebae4c3aa26f1a3441511430f1a36241f8e61c515a5d9bd98ad4740d4d0f7b8db7

C:\MSOCache\ALLUSE~1\{9A861~1\ose.exe

MD5 58b58875a50a0d8b5e7be7d6ac685164
SHA1 1e0b89c1b2585c76e758e9141b846ed4477b0662
SHA256 2a0aa0763fdef9c38c5dd4d50703f0c7e27f4903c139804ec75e55f8388139ae
SHA512 d67214077162a105d01b11a8e207fab08b45b08fbfba0615a2ea146e1dd99eea35e4f02958a1754d3192292c00caf777f186f0a362e4b8b0da51fabbdb76375b

memory/2760-51-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2356-61-0x0000000000400000-0x00000000008D5000-memory.dmp

memory/2452-62-0x00000000002A0000-0x00000000002A1000-memory.dmp

C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE

MD5 eef2f834c8d65585af63916d23b07c36
SHA1 8cb85449d2cdb21bd6def735e1833c8408b8a9c6
SHA256 3cd34a88e3ae7bd3681a7e3c55832af026834055020add33e6bd6f552fc0aabd
SHA512 2ee8766e56e5b1e71c86f7d1a1aa1882706d0bca8f84b2b2c54dd4c255e04f037a6eb265302449950e5f5937b0e57f17a6aa45e88a407ace4b3945e65043d9b7

\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE

MD5 9e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1 ec66cda99f44b62470c6930e5afda061579cde35
SHA256 8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA512 2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE

MD5 6a091285d13370abb4536604b5f2a043
SHA1 8bb4aad8cadbd3894c889de85e7d186369cf6ff1
SHA256 909205de592f50532f01b4ac7b573b891f7e6e596b44ff94187b1ba4bcc296bb
SHA512 9696e4f60a5b1166535ca8ca3fb495d718086463d1a12fa1facc08219ad5b918208ddd2a102f7955e29153b081e05985c4ae6e4302ab36d548bb62991a47db18

memory/2004-93-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Windows\directx.sys

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Windows\directx.sys

MD5 6b3bfceb3942a9508a2148acbee89007
SHA1 3622ac7466cc40f50515eb6fcdc15d1f34ad3be3
SHA256 e0a7bae2a9ac263cff5d725922e40272d8854278d901233a93a5267859c00a3c
SHA512 fa222bfcade636824af32124b45450c92b1abec7a33e6e647a9248eef5371c127d22ccb7cc5a096b4d5d52e2457f3841293a1b34304e8e5523549856ac02f224

C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE

MD5 93c3e336e307036165cb84f845478b7e
SHA1 a27d9bb914069ba513cb05a7f212f8ca53ca38ab
SHA256 06d17877bf8a3691a0915add8d2b705722dccfba0f8c6daf48116e6166ab1ab5
SHA512 07d2e5cf240410e5e2378527686ea1c560185ccfc59dfe5cfa4e0bfd5c3653be4f0fa07f6398238a9de690593b8ce56acb2c657d1f06dadedab72f09bd250c9a

memory/1884-122-0x0000000000400000-0x000000000041B000-memory.dmp

\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe

MD5 034978c5262186b14fd7a2892e30b1cf
SHA1 237397dd3b97c762522542c57c85c3ff96646ba8
SHA256 159776d43dd2a8d843b82ece0faf469f9088a625d474ce4eea9db59d94a844e6
SHA512 d216e757616121d9902b0db2669b6e2aa9eb2697427c9ea2804ebda9690abbf9219c6e603d63ff19dc6115a072985ca862499b5f8319ca057a16e81aec9ea949

C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe

MD5 467aee41a63b9936ce9c5cbb3fa502cd
SHA1 19403cac6a199f6cd77fc5ac4a6737a9a9782dc8
SHA256 99e5bea5f632ef4af76e4e5108486d5e99386c3d451b983bcd3ad2a49cc04039
SHA512 00c9ccdbbd6fd1be0c2dafd485d811be9bf2076d4efeabc256179befd92679b964e80edcb90ef21f3e874578fdb0003878227f560ca76498865770280f87113e

C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE

MD5 46e43f94482a27df61e1df44d764826b
SHA1 8b4eab017e85f8103c60932c5efe8dff12dc5429
SHA256 dc6658dec5bf89f65f2d4b9bdb27634bac0bf5354c792bc8970a2b39f535facd
SHA512 ce5bdd3f9a2394ffda83c93fc5604d972f90bd72e6aded357bdf27a2b21a0469f6ac71ce40d9fb4ed8c845468c4171a3c5b4501edbae79447c4f4e08342d4560

C:\PROGRA~2\Google\Update\DISABL~1.EXE

MD5 3b0e91f9bb6c1f38f7b058c91300e582
SHA1 6e2e650941b1a96bb0bb19ff26a5d304bb09df5f
SHA256 57c993cadf4bf84810cea23a7112c6e260624beaab48d0e4332d3462900fec1d
SHA512 a4fbe28a0135f4632e0a5b6bd775f8d010250b0fbfe223db1fe81d18552a6bc166ebce807853ba02e6a476e9829454805e415ca828a5e043bd1e63dc53599d0f

C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE

MD5 f7c714dbf8e08ca2ed1a2bfb8ca97668
SHA1 cc78bf232157f98b68b8d81327f9f826dabb18ab
SHA256 fc379fda348644fef660a3796861c122aa2dd5498e80279d1279a7ddb259e899
SHA512 28bc04c4df3f632865e68e83d045b3ecd2a263e62853c922b260d0734026e8a1541988fcbf4ddc9cf3aba6863214d6c6eb51f8bbb2586122a7cb01a70f08d16c

C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE

MD5 25e165d6a9c6c0c77ee1f94c9e58754b
SHA1 9b614c1280c75d058508bba2a468f376444b10c1
SHA256 8bbe59987228dd9ab297f9ea34143ea1e926bfb19f3d81c2904ab877f31e1217
SHA512 7d55c7d86ccabb6e9769ebca44764f4d89e221d5756e5c5d211e52c271e3ce222df90bc9938248e2e210d6695f30f6280d929d19ef41c09d3ea31688ae24d4bf

C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE

MD5 e5589ec1e4edb74cc7facdaac2acabfd
SHA1 9b12220318e848ed87bb7604d6f6f5df5dbc6b3f
SHA256 6ce92587a138ec07dac387a294d0bbe8ab629599d1a2868d2afaccea3b245d67
SHA512 f36ab33894681f51b9cec7ea5a738eb081a56bcd7625bdd2f5ef2c084e4beb7378be8f292af3aeae79d9317ba57cc41df89f00aef52e58987bdb2eac3f48171a

C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE

MD5 96a14f39834c93363eebf40ae941242c
SHA1 5a3a676403d4e6ad0a51d0f0e2bbdd636ae5d6fc
SHA256 8ee4aa23eb92c4aba9a46b18ac249a5fa11c5abb7e2c1ca82cd5196401db790a
SHA512 fbf307a8053e9478a52cfdf8e8bad3d7c6664c893458786ae6ee4fffc6fe93006e99a2a60c97fb62dad1addd5247621517f4edee5d9545717c4587a272cef9a2

C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE

MD5 400836f307cf7dbfb469cefd3b0391e7
SHA1 7af3cbb12d3b2d8b5d9553c687c6129d1dd90a10
SHA256 cb5c5abb625a812d47007c75e3855be3f29da527a41cf03730ad5c81f3eb629a
SHA512 aa53cb304478585d6f83b19a6de4a7938ba2570d380a565a56ff5365aed073d5f56b95ad3228eb7d1e7e6110c6172a58b97bd6a5e57e4a8d39e762ed31dc17c8

C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE

MD5 5da33a7b7941c4e76208ee7cddec8e0b
SHA1 cdd2e7b9b0e4be68417d4618e20a8283887c489c
SHA256 531e735e4e8940dfe21e30be0d4179ceaecb57ce431cf63c5044e07048ac1751
SHA512 977aeecfbc693c9d5746fedf08b99e0b0f6fd7b0c7b41ac2b34a832e68a2e6f3c68f38af2e65c87075fcf00c1c6103e34324df45d7da9412cbbeea7e410794b6

memory/2652-152-0x000000007230D000-0x0000000072318000-memory.dmp

memory/2652-151-0x000000005FFF0000-0x0000000060000000-memory.dmp

C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE

MD5 b19c2fa49e278935e6a3087fdd0da46e
SHA1 04a5de16b6840a8fe68753028bd2ff20381ed720
SHA256 c70151fc7fb7d461ba596455bfc7e79e199a3c0ac766c5d67f9347b39e20b7b9
SHA512 0399a45ee6a87d5899020d4106bc6ff521285b34c61afcd4929b6274166f7585c01749a1ee1814e82c90a5d8deb1dfa28bde6b105029f74d33f7a3e848d0dc39

C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE

MD5 b00c357f313ec9514a77608a0199381d
SHA1 9190a7a786b0bd53be06e55f7a7baee612f14666
SHA256 5646465b91fcd21a5e445d9c03bdc19615c48473103d5a3a407144a8a520106d
SHA512 0866ff7c3bf37b9f98b8db7128ca44a5f99ef20c0465558c299276eb205ab207ef5e742076b1d4bef7ea7617e12818b344fc3f6497553cabbb3f667f08c40c69

C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE

MD5 a2dddf04b395f8a08f12001318cc72a4
SHA1 1bd72e6e9230d94f07297c6fcde3d7f752563198
SHA256 b35e60f1551870c1281d673380fe3101cd91b1f0b4d3c14c2383060f5e120373
SHA512 2159df98d90467720b738be68bee5aba38980d2449c18d2ea4b7b9bae7d222b4a85845d0f9597017d0ee417964190bc3d95cb4809e33aac16b6cfa6ec200dce3

C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE

MD5 25b9301a6557a958b0a64752342be27d
SHA1 0887e1a9389a711ef8b82da8e53d9a03901edebc
SHA256 5d916f7c7f6cb6cfd7545a57cb9c9d9c6df16af3517298c346901081a9135303
SHA512 985f6b2fcac2f0425a1a339a55616012879a393caa747412d04c1ee4de3b12aff2cc051860066d84ecbeae335eaa5116ccb8a02090a2674eded367378c56b1ab

C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE

MD5 2d1b4a44f1f9046d9d28e7e70253b31d
SHA1 6ab152d17c2e8a169956f3a61ea13460d495d55e
SHA256 d1d73220342ff51a1514d2354654c6fcaedc9a963cb3e0a7e5b0858cfc5c5c7d
SHA512 dd8f5e343417a3e131b3362f1aecaf9ce0f8a55c9f90aa3b7e55b6ddb6c5f4e06b3e76a7f4481fa13e2f325ab2490553f6977178acf7c486c7315755c05fc7c3

C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE

MD5 f642d1d17c9c11fd36c861ec464ef3bc
SHA1 2bcfbe7d7af87c420949472f1c854be44df9c7ba
SHA256 ef98853ac7877333baf3f8be301402d5f6b894a7f87af7b01f3fca7ef63f6cc3
SHA512 0a7ce3d2a06f759f0fe5c6f611845d4ad255ad51ff5e99ed3c03449273d8c763c81edeeab3e0f3e150192441263d4c7aad232afcc320a52c17bb0c9f336f1bd4

C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE

MD5 7afd0a33775cf371cde36f12c7903be8
SHA1 ee63bd4708bed3dfa25139c4aa9e6316a5452a5b
SHA256 d04fe715d6034fb071a540b2ea7196ca73660434d2b8226963bb5ffc8e52b0fc
SHA512 cf4c07dd9d6d3ffe46247f4f9a9fbdb9a149ed3799afe2b17a2020416fd19ea6f3e9a5fc2de69f1cec404a75b120c1aff5f8e089e9cfae3c45ad5ba5aef2d766

C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE

MD5 15163eb05b0a8f65a5ca3c74a658077d
SHA1 8b116062a5754fa2d73fc4df9f635283ae1ccd02
SHA256 8751c43ee0f3f0e080103a9b77be9e79346004769ed43d4cadd630ea15d26dcf
SHA512 a8299e9a522aa58429847920b999598551c1863f63ba473178f61cde43fb91cab6ef62c9e1a51268e54338e012ccfe6428a7c37bc89007d1604fafa2560258c9

memory/2180-234-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2804-235-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2452-236-0x0000000000400000-0x00000000008D5000-memory.dmp

memory/2180-237-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2804-238-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2452-239-0x0000000000400000-0x00000000008D5000-memory.dmp

memory/2452-240-0x00000000002A0000-0x00000000002A1000-memory.dmp

memory/2180-241-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2652-242-0x000000007230D000-0x0000000072318000-memory.dmp

memory/2804-243-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2180-245-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2804-246-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2180-248-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2804-249-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2180-253-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2804-251-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2452-285-0x0000000000400000-0x00000000008D5000-memory.dmp

Analysis: behavioral3

Detonation Overview

Submitted

2024-04-16 10:44

Reported

2024-04-16 10:50

Platform

win10-20240404-en

Max time kernel

291s

Max time network

245s

Command Line

"C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

Signatures

Detect Neshta payload

Description Indicator Process Target
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A
N/A N/A N/A N/A

Neshta

persistence spyware neshta

Checks computer location settings

Description Indicator Process Target
Key value queried \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\International\Geo\Nation C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
Key value queried \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000\Control Panel\International\Geo\Nation C:\ProgramData\Synaptics\Synaptics.exe N/A

Modifies system executable filetype association

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Reads user/profile data of web browsers

spyware stealer

Adds Run key to start application

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Drops file in Program Files directory

Description Indicator Process Target
File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\SYNAPT~1\SYNAPT~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\WinMail.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\WinMail.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\ACCESS~1\wordpad.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\WINDOW~4\ACCESS~1\wordpad.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\Windows\directx.sys C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
File opened for modification C:\Windows\directx.sys C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A
File opened for modification C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\Windows\directx.sys C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
File opened for modification C:\Windows\svchost.com C:\Windows\svchost.com N/A

Enumerates physical storage devices

Checks processor information in registry

Description Indicator Process Target
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Enumerates system info in registry

Description Indicator Process Target
Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A
Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Modifies registry class

Description Indicator Process Target
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A
Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance C:\ProgramData\Synaptics\Synaptics.exe N/A
Key created \REGISTRY\USER\S-1-5-21-4106386276-4127174233-3637007343-1000_Classes\Local Settings C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe N/A

Suspicious behavior: AddClipboardFormatListener

Description Indicator Process Target
N/A N/A C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE N/A

Suspicious use of WriteProcessMemory

Description Indicator Process Target
PID 4988 wrote to memory of 4468 N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 4988 wrote to memory of 4468 N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 4988 wrote to memory of 4468 N/A C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 4468 wrote to memory of 4876 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 4468 wrote to memory of 4876 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 4468 wrote to memory of 4876 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe
PID 4876 wrote to memory of 4276 N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Windows\svchost.com
PID 4876 wrote to memory of 4276 N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Windows\svchost.com
PID 4876 wrote to memory of 4276 N/A C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\Windows\svchost.com
PID 4276 wrote to memory of 2032 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
PID 4276 wrote to memory of 2032 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
PID 4276 wrote to memory of 2032 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE
PID 4468 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 4468 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 4468 wrote to memory of 2392 N/A C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe C:\ProgramData\Synaptics\Synaptics.exe
PID 2392 wrote to memory of 1068 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 2392 wrote to memory of 1068 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 2392 wrote to memory of 1068 N/A C:\ProgramData\Synaptics\Synaptics.exe C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe
PID 1068 wrote to memory of 4324 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Windows\svchost.com
PID 1068 wrote to memory of 4324 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Windows\svchost.com
PID 1068 wrote to memory of 4324 N/A C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe C:\Windows\svchost.com
PID 4324 wrote to memory of 1888 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
PID 4324 wrote to memory of 1888 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE
PID 4324 wrote to memory of 1888 N/A C:\Windows\svchost.com C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE

Processes

C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

"C:\Users\Admin\AppData\Local\Temp\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

"C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

"C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe"

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE

C:\ProgramData\Synaptics\Synaptics.exe

"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate

C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe

"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate

C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE

"C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" /automation -Embedding

C:\Windows\svchost.com

"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate

Network

Country Destination Domain Proto
US 8.8.8.8:53 97.32.109.52.in-addr.arpa udp
US 8.8.8.8:53 xred.mooo.com udp
US 8.8.8.8:53 freedns.afraid.org udp
US 69.42.215.252:80 freedns.afraid.org tcp
US 8.8.8.8:53 140.32.126.40.in-addr.arpa udp
US 8.8.8.8:53 241.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 252.215.42.69.in-addr.arpa udp
US 8.8.8.8:53 9.173.189.20.in-addr.arpa udp
US 8.8.8.8:53 docs.google.com udp
GB 216.58.201.110:443 docs.google.com tcp
US 8.8.8.8:53 drive.usercontent.google.com udp
GB 142.250.187.193:443 drive.usercontent.google.com tcp
US 8.8.8.8:53 3.180.250.142.in-addr.arpa udp
US 8.8.8.8:53 193.187.250.142.in-addr.arpa udp
US 8.8.8.8:53 249.197.17.2.in-addr.arpa udp
US 8.8.8.8:53 19.229.111.52.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
US 8.8.8.8:53 31.73.42.20.in-addr.arpa udp

Files

C:\Users\Admin\AppData\Local\Temp\3582-490\424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

MD5 7067d1cea6555b1aa1688e667d841ed0
SHA1 5dc8040e57fe06220a9d2635ba3f67778038ecd9
SHA256 9f73f83363cc2bbcb7723be5bc250737cac6b6ed5f9d534e9842a4df38a6b3ec
SHA512 04201fed409e264aa341bdd132402a54aa953bb93fa2e8cd20f8a6d94c6b65b4e180b64ad8170bd3ecd21a1060ed369cb91acfbf3005de1beb0d8da63555b919

memory/4468-6-0x0000000000970000-0x0000000000971000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\._cache_424609fdb918bf7b8423c5c821a1f55a31c9dfab5a7b7893feb2d91402ff3f8d.exe

MD5 253c5affc95591159aa639ee93e29df1
SHA1 61894f2fb132a27f7d24b38c2757cf4931e843a8
SHA256 584de44e6778caaabc2986161c5ff740e85caf7b9ec8b927a6ef3ab00ce86d30
SHA512 026ab53ca9c417c23eb27f7a55530312f310dbd20b27c706b46f248e6418cece0051cd532cbdf73b14c8eb2c1ba2e01fb17f7da264e41986fe6fc2123d42dc02

C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE

MD5 07244a2c002ffdf1986b454429eace0b
SHA1 d7cd121caac2f5989aa68a052f638f82d4566328
SHA256 e9522e6912a0124c0a8c9ff9bb3712b474971376a4eb4ca614bb1664a2b4abcf
SHA512 4a09db85202723a73703c5926921fef60c3dddae21528a01936987306c5e7937463f94a2f4a922811de1f76621def2a8a597a8b38a719dd24e6ff3d4e07492ca

C:\Windows\directx.sys

MD5 d41d8cd98f00b204e9800998ecf8427e
SHA1 da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256 e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512 cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e

C:\Windows\svchost.com

MD5 0be604ce6cb13ac46c5f5fa37c9abb41
SHA1 1c4a555867778586b2727fa6f7331510b93234a8
SHA256 efb23890eba9d105120819fe1c25da2e314a9e10618aa2dd40a97c8a9dd79bdd
SHA512 06cdf862c495b99520e946b59a8721bfa4d89be284bcf9c155a38a1b25c281cc4d580d2af791034ef6c04c4a677ecaa56205ba21d740980d7985d45432038f21

memory/4276-70-0x0000000000400000-0x000000000041B000-memory.dmp

memory/4468-111-0x0000000000400000-0x00000000008D5000-memory.dmp

memory/2392-114-0x0000000000910000-0x0000000000911000-memory.dmp

C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe

MD5 8ffc3bdf4a1903d9e28b99d1643fc9c7
SHA1 919ba8594db0ae245a8abd80f9f3698826fc6fe5
SHA256 8268d3fefe8ca96a25a73690d14bacf644170ab5e9e70d2f8eeb350a4c83f9f6
SHA512 0b94ead97374d74eaee87e7614ddd3911d2cf66d4c49abbfd06b02c03e5dd56fd00993b4947e8a4bcd9d891fa39cab18cc6b61efc7d0812e91eb3aea9cd1a427

C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE

MD5 12c29dd57aa69f45ddd2e47620e0a8d9
SHA1 ba297aa3fe237ca916257bc46370b360a2db2223
SHA256 22a585c183e27b3c732028ff193733c2f9d03700a0e95e65c556b0592c43d880
SHA512 255176cd1a88dfa2af3838769cc20dc7ad9d969344801f07b9ebb372c12cee3f47f2dba3559f391deab10650875cad245d9724acfa23a42b336bfa96559a5488

C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE

MD5 92dc0a5b61c98ac6ca3c9e09711e0a5d
SHA1 f809f50cfdfbc469561bced921d0bad343a0d7b4
SHA256 3e9da97a7106122245e77f13f3f3cc96c055d732ab841eb848d03ac25401c1bc
SHA512 d9eefb19f82e0786d9be0dbe5e339d25473fb3a09682f40c6d190d4c320cca5556abb72b5d97c6b0da4f8faefdc6d39ac9d0415fdf94ebcc90ecdf2e513c6a31

C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE

MD5 8c753d6448183dea5269445738486e01
SHA1 ebbbdc0022ca7487cd6294714cd3fbcb70923af9
SHA256 473eb551101caeaf2d18f811342e21de323c8dd19ed21011997716871defe997
SHA512 4f6fddefc42455540448eac0b693a4847e21b68467486376a4186776bfe137337733d3075b7b87ed7dac532478dc9afc63883607ec8205df3f155fee64c7a9be

C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE

MD5 4ddc609ae13a777493f3eeda70a81d40
SHA1 8957c390f9b2c136d37190e32bccae3ae671c80a
SHA256 16d65f2463658a72dba205dcaa18bc3d0bab4453e726233d68bc176e69db0950
SHA512 9d7f90d1529cab20078c2690bf7bffab5a451a41d8993781effe807e619da0e7292f991da2f0c5c131b111d028b3e6084e5648c90816e74dfb664e7f78181bc5

C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe

MD5 5791075058b526842f4601c46abd59f5
SHA1 b2748f7542e2eebcd0353c3720d92bbffad8678f
SHA256 5c3ef3ec7594c040146e908014791dd15201ba58b4d70032770bb661b6a0e394
SHA512 83e303971ed64019fde9e4ba6f6e889f8fb105088490dfa7dcf579a12baff20ef491f563d132d60c7b24a4fd3cac29bd9dc974571cd162000fae8fba4e0e54fb

memory/4248-167-0x00007FF956BF0000-0x00007FF956C00000-memory.dmp

memory/4248-169-0x00007FF956BF0000-0x00007FF956C00000-memory.dmp

memory/4248-182-0x00007FF956BF0000-0x00007FF956C00000-memory.dmp

memory/4248-194-0x00007FF956BF0000-0x00007FF956C00000-memory.dmp

C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe

MD5 9a8d683f9f884ddd9160a5912ca06995
SHA1 98dc8682a0c44727ee039298665f5d95b057c854
SHA256 5e2e22ead49ce9cc11141dbeebbe5b93a530c966695d8efc2083f00e6be53423
SHA512 6aecf8c5cb5796d6879f8643e20c653f58bad70820896b0019c39623604d5b3c8a4420562ab051c6685edce60aa068d9c2dbb4413a7b16c6d01a9ac10dc22c12

C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE

MD5 cbd96ba6abe7564cb5980502eec0b5f6
SHA1 74e1fe1429cec3e91f55364e5cb8385a64bb0006
SHA256 405b8bd647fa703e233b8b609a18999abe465a8458168f1daf23197bd2ea36aa
SHA512 a551001853f6b93dfbc6cf6a681820af31330a19d5411076ff3dbce90937b3d92173085a15f29ebf56f2ef12a4e86860ac6723ebc89c98ea31ea7a6c7e3d7cdc

C:\PROGRA~2\Google\Update\DISABL~1.EXE

MD5 3b0e91f9bb6c1f38f7b058c91300e582
SHA1 6e2e650941b1a96bb0bb19ff26a5d304bb09df5f
SHA256 57c993cadf4bf84810cea23a7112c6e260624beaab48d0e4332d3462900fec1d
SHA512 a4fbe28a0135f4632e0a5b6bd775f8d010250b0fbfe223db1fe81d18552a6bc166ebce807853ba02e6a476e9829454805e415ca828a5e043bd1e63dc53599d0f

memory/4248-231-0x00007FF996B60000-0x00007FF996D3B000-memory.dmp

C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE

MD5 15163eb05b0a8f65a5ca3c74a658077d
SHA1 8b116062a5754fa2d73fc4df9f635283ae1ccd02
SHA256 8751c43ee0f3f0e080103a9b77be9e79346004769ed43d4cadd630ea15d26dcf
SHA512 a8299e9a522aa58429847920b999598551c1863f63ba473178f61cde43fb91cab6ef62c9e1a51268e54338e012ccfe6428a7c37bc89007d1604fafa2560258c9

C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE

MD5 f7c714dbf8e08ca2ed1a2bfb8ca97668
SHA1 cc78bf232157f98b68b8d81327f9f826dabb18ab
SHA256 fc379fda348644fef660a3796861c122aa2dd5498e80279d1279a7ddb259e899
SHA512 28bc04c4df3f632865e68e83d045b3ecd2a263e62853c922b260d0734026e8a1541988fcbf4ddc9cf3aba6863214d6c6eb51f8bbb2586122a7cb01a70f08d16c

C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE

MD5 25e165d6a9c6c0c77ee1f94c9e58754b
SHA1 9b614c1280c75d058508bba2a468f376444b10c1
SHA256 8bbe59987228dd9ab297f9ea34143ea1e926bfb19f3d81c2904ab877f31e1217
SHA512 7d55c7d86ccabb6e9769ebca44764f4d89e221d5756e5c5d211e52c271e3ce222df90bc9938248e2e210d6695f30f6280d929d19ef41c09d3ea31688ae24d4bf

C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE

MD5 e5589ec1e4edb74cc7facdaac2acabfd
SHA1 9b12220318e848ed87bb7604d6f6f5df5dbc6b3f
SHA256 6ce92587a138ec07dac387a294d0bbe8ab629599d1a2868d2afaccea3b245d67
SHA512 f36ab33894681f51b9cec7ea5a738eb081a56bcd7625bdd2f5ef2c084e4beb7378be8f292af3aeae79d9317ba57cc41df89f00aef52e58987bdb2eac3f48171a

memory/4248-214-0x00007FF996B60000-0x00007FF996D3B000-memory.dmp

C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE

MD5 400836f307cf7dbfb469cefd3b0391e7
SHA1 7af3cbb12d3b2d8b5d9553c687c6129d1dd90a10
SHA256 cb5c5abb625a812d47007c75e3855be3f29da527a41cf03730ad5c81f3eb629a
SHA512 aa53cb304478585d6f83b19a6de4a7938ba2570d380a565a56ff5365aed073d5f56b95ad3228eb7d1e7e6110c6172a58b97bd6a5e57e4a8d39e762ed31dc17c8

C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE

MD5 5da33a7b7941c4e76208ee7cddec8e0b
SHA1 cdd2e7b9b0e4be68417d4618e20a8283887c489c
SHA256 531e735e4e8940dfe21e30be0d4179ceaecb57ce431cf63c5044e07048ac1751
SHA512 977aeecfbc693c9d5746fedf08b99e0b0f6fd7b0c7b41ac2b34a832e68a2e6f3c68f38af2e65c87075fcf00c1c6103e34324df45d7da9412cbbeea7e410794b6

C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jusched.exe

MD5 028aea45f143a63ba70146a4abe2ceeb
SHA1 c616258da4d8a7c9ff7dd5fff089d983d1553e09
SHA256 adc7b8fc26491206149496e2bceaf3686424274f444f14e2dd6fbf2ac7423ddf
SHA512 a266d0e2fd2676db41317622938cc03ff33c1904129d4ba0ef2d97a88313c882e719c8d4798c18a97ca64bc5ebdb90dd05290f25569e967966e2f5399f1f511d

C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jucheck.exe

MD5 d1c48274711d83d4a1a0cfb2abdf8d31
SHA1 b4367dd7201ef0cc22d56613e428efda07da57a8
SHA256 ade1db79870327538841d5470483c6474083f08d871bb7d56cfc9e76971c8640
SHA512 7a3e7927b8be3dc1706e6511bf04475558da076696435f937c4eafa94111c378f3bcaa1ea4e5063e91e3e333c91f086a75baaff6c5cc190d3d314c5eee1687a3

C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaw.exe

MD5 d1285e6914b5cefa480b3098befc8678
SHA1 09036602ea48e9e851ded82646527dbc44334dd4
SHA256 d1d6cc7de89139823eb1fe77d94c5f408da25afcc81886ed2c6f4f067b2c6c5c
SHA512 19dde4de1db67c50d87a165f61d97cedf05cecb624204c06b8caee8e6ed2477616fc4c1060a6ba2071437011a9b1cd2c572136571f9070bf3acc9f67c288f701

memory/4248-232-0x00007FF996B60000-0x00007FF996D3B000-memory.dmp

memory/4248-239-0x00007FF996B60000-0x00007FF996D3B000-memory.dmp

memory/4248-238-0x00007FF9540A0000-0x00007FF9540B0000-memory.dmp

memory/4248-240-0x00007FF996B60000-0x00007FF996D3B000-memory.dmp

memory/4248-237-0x00007FF996650000-0x00007FF9966FE000-memory.dmp

memory/4248-241-0x00007FF996B60000-0x00007FF996D3B000-memory.dmp

C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE

MD5 63dc05e27a0b43bf25f151751b481b8c
SHA1 b20321483dac62bce0aa0cef1d193d247747e189
SHA256 7d607fb69c69a72a5bf4305599279f46318312ce1082b6a34ac9100b8c7762ce
SHA512 374d705704d456cc5f9f79b7f465f6ec7c775dc43001c840e9d6efbbdef20926ed1fa97f8a9b1e73161e17f72520b96c05fa58ac86b3945208b405f9166e7ba3

memory/4248-244-0x00007FF9540A0000-0x00007FF9540B0000-memory.dmp

C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE

MD5 87f15006aea3b4433e226882a56f188d
SHA1 e3ad6beb8229af62b0824151dbf546c0506d4f65
SHA256 8d0045c74270281c705009d49441167c8a51ac70b720f84ff941b39fad220919
SHA512 b01a8af6dc836044d2adc6828654fa7a187c3f7ffe2a4db4c73021be6d121f9c1c47b1643513c3f25c0e1b5123b8ce2dc78b2ca8ce638a09c2171f158762c7c1

C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE

MD5 9597098cfbc45fae685d9480d135ed13
SHA1 84401f03a7942a7e4fcd26e4414b227edd9b0f09
SHA256 45966655baaed42df92cd6d8094b4172c0e7a0320528b59cf63fca7c25d66e9c
SHA512 16afbdffe4b4b2e54b4cc96fe74e49ca367dea50752321ddf334756519812ba8ce147ef5459e421dc42e103bc3456aab1d185588cc86b35fa2315ac86b2a0164

C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE

MD5 9c10a5ec52c145d340df7eafdb69c478
SHA1 57f3d99e41d123ad5f185fc21454367a7285db42
SHA256 ccf37e88447a7afdb0ba4351b8c5606dbb05b984fb133194d71bcc00d7be4e36
SHA512 2704cfd1a708bfca6db7c52467d3abf0b09313db0cdd1ea8e5d48504c8240c4bf24e677f17c5df9e3ac1f6a678e0328e73e951dc4481f35027cb03b2966dc38f

C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE

MD5 97510a7d9bf0811a6ea89fad85a9f3f3
SHA1 2ac0c49b66a92789be65580a38ae9798237711db
SHA256 c48abbc29405559e68cc9f8fc6d218aa317a9d0023839c7846ca509c1f563fea
SHA512 2a93e2a3bd187fdde160f87ef777ccd1d1c398d547b7c869e6b64469b9418ad04d887cdfe94af7407476377bf2d009f576de3935c025b7aefbab26fbcd8f90fb

memory/4248-243-0x00007FF996B60000-0x00007FF996D3B000-memory.dmp

C:\Users\Admin\AppData\Local\MICROS~1\OneDrive\ONEDRI~1.EXE

MD5 1319acbba64ecbcd5e3f16fc3acd693c
SHA1 f5d64f97194846bd0564d20ee290d35dd3df40b0
SHA256 8c6f9493c2045bb7c08630cf3709a63e221001f04289b311efb259de3eb76bce
SHA512 abbbb0abfff1698e2d3c4d27d84421b90abba1238b45884b82ace20d11ddfdd92bf206519fc01714235fb840258bb1c647c544b9a19d36f155bf3224916805b8

memory/4248-263-0x00007FF996650000-0x00007FF9966FE000-memory.dmp

memory/4248-259-0x00007FF996B60000-0x00007FF996D3B000-memory.dmp

memory/4248-264-0x00007FF996B60000-0x00007FF996D3B000-memory.dmp

memory/4248-254-0x00007FF996B60000-0x00007FF996D3B000-memory.dmp

C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe

MD5 05bdfd8a3128ab14d96818f43ebe9c0e
SHA1 495cbbd020391e05d11c52aa23bdae7b89532eb7
SHA256 7b945c7e6b8bfbb489f003ecd1d0dcd4803042003de4646d4206114361a0fbbb
SHA512 8d9b9fc407986bd53fe3b56c96b7371cc782b4bac705253bfb0a2b0b1e6883fdb022f1ac87b8bfd7005291991b6a3dfbaceab54f5d494e0af70f0435a0b8b0da

C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE

MD5 bcd0f32f28d3c2ba8f53d1052d05252d
SHA1 c29b4591df930dabc1a4bd0fa2c0ad91500eafb2
SHA256 bb07d817b8b1b6b4c25e62b6120e51dec10118557d7b6b696ad084a5ba5bfdeb
SHA512 79f407735853f82f46870c52058ceee4d91857a89db14868ee1169abd5c0fd2e3fa1ed230ab90b5f479a9581b88998643d69b0df498defea29e73b0d487f3b10

C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe

MD5 d47ed8961782d9e27f359447fa86c266
SHA1 d37d3f962c8d302b18ec468b4abe94f792f72a3b
SHA256 b1ec065f71cc40f400e006586d370997102860504fd643b235e8ed9f5607262a
SHA512 3e33f2cdf35024868b183449019de9278035e7966b342ba320a6c601b5629792cbb98a19850d4ca80b906c85d10e8503b0193794d1f1efa849fa33d26cff0669

C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE

MD5 40c8e5f4f7fb2fa4c6ed47e7f254a3cc
SHA1 5da20099194e003816c3fd46408b5e5ab934b424
SHA256 2a28751ada21b17ca140ed3a03dccd29995b2ef702528eed1cc02bff0292f327
SHA512 5e91bd9347df79eca484f6c5768930a191ffd679d5979b8c896f620c6f207c02f737782f0c6453e0973748c78bc9bc2cc537b27378f73a80dd254c2df9667ae3

memory/4324-185-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Users\ALLUSE~1\PACKAG~1\{33D1F~1\VCREDI~1.EXE

MD5 86749cd13537a694795be5d87ef7106d
SHA1 538030845680a8be8219618daee29e368dc1e06c
SHA256 8c35dcc975a5c7c687686a3970306452476d17a89787bc5bd3bf21b9de0d36a5
SHA512 7b6ae20515fb6b13701df422cbb0844d26c8a98087b2758427781f0bf11eb9ec5da029096e42960bf99ddd3d4f817db6e29ac172039110df6ea92547d331db4c

C:\Users\ALLUSE~1\PACKAG~1\{EF6B0~1\VCREDI~1.EXE

MD5 07e194ce831b1846111eb6c8b176c86e
SHA1 b9c83ec3b0949cb661878fb1a8b43a073e15baf1
SHA256 d882f673ddf40a7ea6d89ce25e4ee55d94a5ef0b5403aa8d86656fd960d0e4ac
SHA512 55f9b6d3199aa60d836b6792ae55731236fb2a99c79ce8522e07e579c64eabb88fa413c02632deb87a361dd8490361aa1424beed2e01ba28be220f8c676a1bb5

memory/1068-183-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\P4VPjUOJ.xlsm

MD5 e566fc53051035e1e6fd0ed1823de0f9
SHA1 00bc96c48b98676ecd67e81a6f1d7754e4156044
SHA256 8e574b4ae6502230c0829e2319a6c146aebd51b7008bf5bbfb731424d7952c15
SHA512 a12f56ff30ea35381c2b8f8af2446cf1daa21ee872e98cad4b863db060acd4c33c5760918c277dadb7a490cb4ca2f925d59c70dc5171e16601a11bc4a6542b04

memory/4248-170-0x00007FF996B60000-0x00007FF996D3B000-memory.dmp

memory/4248-168-0x00007FF996B60000-0x00007FF996D3B000-memory.dmp

memory/4988-404-0x0000000000400000-0x000000000041B000-memory.dmp

memory/4876-405-0x0000000000400000-0x000000000041B000-memory.dmp

memory/2392-406-0x0000000000400000-0x00000000008D5000-memory.dmp

memory/4988-410-0x0000000000400000-0x000000000041B000-memory.dmp

memory/4876-411-0x0000000000400000-0x000000000041B000-memory.dmp

memory/4988-415-0x0000000000400000-0x000000000041B000-memory.dmp

memory/4876-416-0x0000000000400000-0x000000000041B000-memory.dmp

C:\Users\Admin\AppData\Local\Temp\tmp5023.tmp

MD5 3919865d53ce7149dfa452a03c4459f1
SHA1 943070655bf4d8c610f5a4a3d947f78bc069ce39
SHA256 7d5506bfb41c2c557532acd525e3c1ba6bd8a370f16e1736a78bbbb566ef92c8
SHA512 b6f9a567f6c742b7fc242fe0f720a2971f80ebf39c8b29ff20af0e509c69839340bbf05d293034e05b239a1af39ca1b7237cd9bf211cdd10eff097961160ff25

memory/2392-418-0x0000000000910000-0x0000000000911000-memory.dmp

memory/4248-419-0x00007FF996B60000-0x00007FF996D3B000-memory.dmp

memory/4248-420-0x00007FF996B60000-0x00007FF996D3B000-memory.dmp

memory/2392-450-0x0000000000400000-0x00000000008D5000-memory.dmp