Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26/08/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
d73b653ff4b7f684326e2f28a1d28510N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
d73b653ff4b7f684326e2f28a1d28510N.exe
Resource
win10v2004-20240802-en
General
-
Target
d73b653ff4b7f684326e2f28a1d28510N.exe
-
Size
2.6MB
-
MD5
d73b653ff4b7f684326e2f28a1d28510
-
SHA1
92a02637089c067ad8011dd51ee57233bd479c0d
-
SHA256
cf53802417729843e4ff74051077f0b411136af2d4f283b0e2fba6fbd42aad7a
-
SHA512
d05015eedf0c5db7d26388677cfee3c8481f86ebdf925d22744eb3dbf639d252c03dc0040c9982b9eadcba9c42f8365169ca5a015275b4552940f04ad4fb6517
-
SSDEEP
49152:hBQHYA0u31Dpdi91hrWtSxuhktPxhcmoendliQMaRdzNQeyUHBdH3pvFO:hBQH9ji91hrZ3vNKe9Bp5vFO
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0007000000023432-8.dat family_neshta behavioral2/files/0x0007000000023434-22.dat family_neshta behavioral2/files/0x0007000000023436-32.dat family_neshta behavioral2/memory/2672-38-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2208-48-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2880-50-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1172-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2384-62-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4732-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1252-74-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4044-78-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020363-89.dat family_neshta behavioral2/files/0x0006000000020232-96.dat family_neshta behavioral2/files/0x000600000002023e-95.dat family_neshta behavioral2/files/0x0006000000020236-94.dat family_neshta behavioral2/files/0x000700000002029e-92.dat family_neshta behavioral2/memory/4116-110-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4776-121-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000202af-106.dat family_neshta behavioral2/files/0x0004000000020368-105.dat family_neshta behavioral2/memory/1548-133-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3900-122-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020255-135.dat family_neshta behavioral2/memory/3020-139-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214f9-154.dat family_neshta behavioral2/files/0x00010000000214fa-157.dat family_neshta behavioral2/memory/4292-164-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214fb-163.dat family_neshta behavioral2/files/0x0001000000022f34-169.dat family_neshta behavioral2/files/0x0001000000016804-179.dat family_neshta behavioral2/files/0x0001000000022f77-177.dat family_neshta behavioral2/files/0x000100000001dbc5-195.dat family_neshta behavioral2/files/0x0001000000016919-208.dat family_neshta behavioral2/files/0x000100000001691b-203.dat family_neshta behavioral2/files/0x0002000000000723-213.dat family_neshta behavioral2/files/0x00010000000167eb-192.dat family_neshta behavioral2/files/0x00010000000225f6-143.dat family_neshta behavioral2/memory/448-226-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4040-238-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5072-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2096-246-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4452-247-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4832-250-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2620-261-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4816-268-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2340-269-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4340-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4044-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1460-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3508-285-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3364-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4092-293-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1384-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1956-301-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2040-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4224-309-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1548-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1084-317-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3684-322-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4824-325-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3964-327-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4440-333-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4088-335-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3772-341-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation d73b653ff4b7f684326e2f28a1d28510N.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation D73B65~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 1616 svchost.exe 2320 d73b653ff4b7f684326e2f28a1d28510N.exe 3904 svchost.exe 2260 d73b653ff4b7f684326e2f28a1d28510N.exe 4852 svchost.exe 4428 d73b653ff4b7f684326e2f28a1d28510N.exe 2672 svchost.com 2208 D73B65~1.EXE 2880 svchost.com 1172 D73B65~1.EXE 2384 svchost.com 4732 D73B65~1.EXE 1252 svchost.com 4044 D73B65~1.EXE 4116 svchost.com 4776 D73B65~1.EXE 3900 svchost.com 1548 D73B65~1.EXE 3020 svchost.com 4292 D73B65~1.EXE 448 svchost.com 4040 D73B65~1.EXE 5072 svchost.com 2096 D73B65~1.EXE 4452 svchost.com 4832 D73B65~1.EXE 2620 svchost.com 4816 D73B65~1.EXE 2340 svchost.com 4340 D73B65~1.EXE 4044 svchost.com 1460 D73B65~1.EXE 3508 svchost.com 3364 D73B65~1.EXE 4092 svchost.com 1384 D73B65~1.EXE 1956 svchost.com 2040 D73B65~1.EXE 4224 svchost.com 1548 D73B65~1.EXE 1084 svchost.com 3684 D73B65~1.EXE 4824 svchost.com 3964 D73B65~1.EXE 4440 svchost.com 4088 D73B65~1.EXE 3772 svchost.com 4856 D73B65~1.EXE 2520 svchost.com 3716 D73B65~1.EXE 4544 svchost.com 448 D73B65~1.EXE 1780 svchost.com 2312 D73B65~1.EXE 3996 svchost.com 3192 D73B65~1.EXE 1256 svchost.com 3476 D73B65~1.EXE 992 svchost.com 640 D73B65~1.EXE 1592 svchost.com 620 D73B65~1.EXE 2864 svchost.com 4116 D73B65~1.EXE -
Modifies system executable filetype association 2 TTPs 9 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" d73b653ff4b7f684326e2f28a1d28510N.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA} D73B65~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32 D73B65~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" D73B65~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} D73B65~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR D73B65~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ D73B65~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ D73B65~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\WinRAR\ = "{B41DB860-64E4-11D2-9906-E49FADC173CA}" D73B65~1.EXE -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\schemagen.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstatd.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe svchost.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\Program Files\dotnet\dotnet.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsgen.exe svchost.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\chrmstp.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\wsimport.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jhat.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe d73b653ff4b7f684326e2f28a1d28510N.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\serialver.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe svchost.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\svchost.com D73B65~1.EXE File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys D73B65~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language D73B65~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA} D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR32 D73B65~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shell D73B65~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" d73b653ff4b7f684326e2f28a1d28510N.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings d73b653ff4b7f684326e2f28a1d28510N.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Drive\shellex\DragDropHandlers\WinRAR32\ = "{B41DB860-8EE4-11D2-9906-E49FADC173CA}" D73B65~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shell\open\command D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\WinRAR.exe,0" D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\ContextMenuHandlers D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers\{B41DB860-8EE4-11D2-9906-E49FADC173CA}\ D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.ZIP\shellex\PropertySheetHandlers D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shellex\PropertySheetHandlers\{B41DB860-64E4-11D2-9906-E49FADC173CA}\ D73B65~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\ContextMenuHandlers D73B65~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\*\shellex\ContextMenuHandlers\WinRAR D73B65~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell\open D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\shellex\DropHandler D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\3582-490\\WinRAR.exe,0" D73B65~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\shell D73B65~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WinRAR.REV\DefaultIcon D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings D73B65~1.EXE -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2040 D73B65~1.EXE 2040 D73B65~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4172 wrote to memory of 1616 4172 d73b653ff4b7f684326e2f28a1d28510N.exe 84 PID 4172 wrote to memory of 1616 4172 d73b653ff4b7f684326e2f28a1d28510N.exe 84 PID 4172 wrote to memory of 1616 4172 d73b653ff4b7f684326e2f28a1d28510N.exe 84 PID 1616 wrote to memory of 2320 1616 svchost.exe 85 PID 1616 wrote to memory of 2320 1616 svchost.exe 85 PID 1616 wrote to memory of 2320 1616 svchost.exe 85 PID 2320 wrote to memory of 2260 2320 d73b653ff4b7f684326e2f28a1d28510N.exe 87 PID 2320 wrote to memory of 2260 2320 d73b653ff4b7f684326e2f28a1d28510N.exe 87 PID 2320 wrote to memory of 2260 2320 d73b653ff4b7f684326e2f28a1d28510N.exe 87 PID 2260 wrote to memory of 4852 2260 d73b653ff4b7f684326e2f28a1d28510N.exe 88 PID 2260 wrote to memory of 4852 2260 d73b653ff4b7f684326e2f28a1d28510N.exe 88 PID 2260 wrote to memory of 4852 2260 d73b653ff4b7f684326e2f28a1d28510N.exe 88 PID 4852 wrote to memory of 4428 4852 svchost.exe 89 PID 4852 wrote to memory of 4428 4852 svchost.exe 89 PID 4852 wrote to memory of 4428 4852 svchost.exe 89 PID 4428 wrote to memory of 2672 4428 d73b653ff4b7f684326e2f28a1d28510N.exe 90 PID 4428 wrote to memory of 2672 4428 d73b653ff4b7f684326e2f28a1d28510N.exe 90 PID 4428 wrote to memory of 2672 4428 d73b653ff4b7f684326e2f28a1d28510N.exe 90 PID 2672 wrote to memory of 2208 2672 svchost.com 91 PID 2672 wrote to memory of 2208 2672 svchost.com 91 PID 2672 wrote to memory of 2208 2672 svchost.com 91 PID 2208 wrote to memory of 2880 2208 D73B65~1.EXE 92 PID 2208 wrote to memory of 2880 2208 D73B65~1.EXE 92 PID 2208 wrote to memory of 2880 2208 D73B65~1.EXE 92 PID 2880 wrote to memory of 1172 2880 svchost.com 93 PID 2880 wrote to memory of 1172 2880 svchost.com 93 PID 2880 wrote to memory of 1172 2880 svchost.com 93 PID 1172 wrote to memory of 2384 1172 D73B65~1.EXE 94 PID 1172 wrote to memory of 2384 1172 D73B65~1.EXE 94 PID 1172 wrote to memory of 2384 1172 D73B65~1.EXE 94 PID 2384 wrote to memory of 4732 2384 svchost.com 95 PID 2384 wrote to memory of 4732 2384 svchost.com 95 PID 2384 wrote to memory of 4732 2384 svchost.com 95 PID 4732 wrote to memory of 1252 4732 D73B65~1.EXE 97 PID 4732 wrote to memory of 1252 4732 D73B65~1.EXE 97 PID 4732 wrote to memory of 1252 4732 D73B65~1.EXE 97 PID 1252 wrote to memory of 4044 1252 svchost.com 115 PID 1252 wrote to memory of 4044 1252 svchost.com 115 PID 1252 wrote to memory of 4044 1252 svchost.com 115 PID 4044 wrote to memory of 4116 4044 D73B65~1.EXE 149 PID 4044 wrote to memory of 4116 4044 D73B65~1.EXE 149 PID 4044 wrote to memory of 4116 4044 D73B65~1.EXE 149 PID 4116 wrote to memory of 4776 4116 svchost.com 100 PID 4116 wrote to memory of 4776 4116 svchost.com 100 PID 4116 wrote to memory of 4776 4116 svchost.com 100 PID 4776 wrote to memory of 3900 4776 D73B65~1.EXE 101 PID 4776 wrote to memory of 3900 4776 D73B65~1.EXE 101 PID 4776 wrote to memory of 3900 4776 D73B65~1.EXE 101 PID 3900 wrote to memory of 1548 3900 svchost.com 191 PID 3900 wrote to memory of 1548 3900 svchost.com 191 PID 3900 wrote to memory of 1548 3900 svchost.com 191 PID 1548 wrote to memory of 3020 1548 D73B65~1.EXE 103 PID 1548 wrote to memory of 3020 1548 D73B65~1.EXE 103 PID 1548 wrote to memory of 3020 1548 D73B65~1.EXE 103 PID 3020 wrote to memory of 4292 3020 svchost.com 104 PID 3020 wrote to memory of 4292 3020 svchost.com 104 PID 3020 wrote to memory of 4292 3020 svchost.com 104 PID 4292 wrote to memory of 448 4292 D73B65~1.EXE 136 PID 4292 wrote to memory of 448 4292 D73B65~1.EXE 136 PID 4292 wrote to memory of 448 4292 D73B65~1.EXE 136 PID 448 wrote to memory of 4040 448 svchost.com 106 PID 448 wrote to memory of 4040 448 svchost.com 106 PID 448 wrote to memory of 4040 448 svchost.com 106 PID 4040 wrote to memory of 5072 4040 D73B65~1.EXE 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\d73b653ff4b7f684326e2f28a1d28510N.exe"C:\Users\Admin\AppData\Local\Temp\d73b653ff4b7f684326e2f28a1d28510N.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\d73b653ff4b7f684326e2f28a1d28510N.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\d73b653ff4b7f684326e2f28a1d28510N.exe"C:\Users\Admin\AppData\Local\Temp\d73b653ff4b7f684326e2f28a1d28510N.exe"3⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\3582-490\d73b653ff4b7f684326e2f28a1d28510N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\d73b653ff4b7f684326e2f28a1d28510N.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\d73b653ff4b7f684326e2f28a1d28510N.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\d73b653ff4b7f684326e2f28a1d28510N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\d73b653ff4b7f684326e2f28a1d28510N.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"23⤵
- Executes dropped EXE
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"25⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE26⤵
- Executes dropped EXE
PID:4832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
PID:4816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"31⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"33⤵
- Executes dropped EXE
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE34⤵
- Executes dropped EXE
PID:3364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"35⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"37⤵
- Executes dropped EXE
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"39⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE44⤵
- Executes dropped EXE
- Modifies registry class
PID:3964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"45⤵
- Executes dropped EXE
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE48⤵
- Executes dropped EXE
- Modifies registry class
PID:4856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"49⤵
- Executes dropped EXE
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"51⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"53⤵
- Executes dropped EXE
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
PID:2312 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"55⤵
- Executes dropped EXE
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE56⤵
- Executes dropped EXE
PID:3192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE58⤵
- Executes dropped EXE
- Modifies registry class
PID:3476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE62⤵
- Executes dropped EXE
PID:620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"63⤵
- Executes dropped EXE
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE64⤵
- Executes dropped EXE
PID:4116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"65⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE66⤵PID:3976
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"67⤵PID:3600
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE68⤵PID:1912
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"69⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE70⤵
- Modifies registry class
PID:1296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"71⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE72⤵
- Drops file in Windows directory
PID:2112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE74⤵
- Checks computer location settings
PID:3764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE76⤵PID:4176
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"77⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4484 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE78⤵PID:2876
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"79⤵PID:4856
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE80⤵
- Checks computer location settings
PID:4932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"81⤵PID:4220
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE82⤵
- Drops file in Windows directory
PID:960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"83⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE84⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"85⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE86⤵
- Checks computer location settings
PID:4240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"87⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE88⤵
- Checks computer location settings
PID:4656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"89⤵
- Drops file in Windows directory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE90⤵
- Modifies registry class
PID:1812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"91⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE92⤵PID:1448
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"93⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE94⤵
- Checks computer location settings
PID:2336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"95⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE96⤵
- Checks computer location settings
- Modifies registry class
PID:1860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"97⤵PID:4572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE98⤵
- Modifies registry class
PID:2020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE100⤵
- System Location Discovery: System Language Discovery
PID:3320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"101⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE102⤵
- Checks computer location settings
- Drops file in Windows directory
PID:1108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"103⤵
- System Location Discovery: System Language Discovery
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE104⤵
- Drops file in Windows directory
PID:956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"105⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE106⤵
- Checks computer location settings
- Modifies registry class
PID:4180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"107⤵
- System Location Discovery: System Language Discovery
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE108⤵PID:2348
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"109⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE110⤵
- System Location Discovery: System Language Discovery
PID:804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"111⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE112⤵
- Checks computer location settings
PID:3948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"113⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE114⤵
- Drops file in Windows directory
- Modifies registry class
PID:372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"115⤵
- System Location Discovery: System Language Discovery
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE116⤵
- Modifies registry class
PID:4484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE118⤵PID:3460
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"119⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4124 -
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE120⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE"121⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\D73B65~1.EXE122⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4288
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-