Analysis
-
max time kernel
95s -
max time network
135s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 22:28
Static task
static1
Behavioral task
behavioral1
Sample
3211fb257bb634726e4897f65477708b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3211fb257bb634726e4897f65477708b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3211fb257bb634726e4897f65477708b_JaffaCakes118.exe
-
Size
297KB
-
MD5
3211fb257bb634726e4897f65477708b
-
SHA1
5cc6d72aaa4b986e3c3447b4d32468a4353902aa
-
SHA256
961fcc4c0b3ca9d9f553d39227ca0629cc01f3eab3bf681c1644f9134f184727
-
SHA512
ae3f06d9e430c8e349883eadd47568b70c4cc20ca84aa0e98c249ebf4e3160766ab59ea7f659b761de39498a802f4954c6e621805ff48df98a3df29361b0982e
-
SSDEEP
6144:PuivkfYlPm3zKJbTP+W0aHwpALVWrRmyEu:Bg92TWW0WwO5WU
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 3211FB~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 1900 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe 796 svchost.com 4204 3211FB~1.EXE 2296 svchost.com 3024 3211FB~1.EXE 4984 svchost.com 232 3211FB~1.EXE 5052 svchost.com 3584 3211FB~1.EXE 4488 svchost.com 4380 3211FB~1.EXE 5112 svchost.com 3588 3211FB~1.EXE 1464 svchost.com 3920 3211FB~1.EXE 1756 svchost.com 1616 3211FB~1.EXE 4288 svchost.com 4956 3211FB~1.EXE 2244 svchost.com 3044 3211FB~1.EXE 2864 svchost.com 1928 3211FB~1.EXE 1472 svchost.com 2728 3211FB~1.EXE 4648 svchost.com 4024 3211FB~1.EXE 3284 svchost.com 2196 3211FB~1.EXE 1328 svchost.com 436 3211FB~1.EXE 4988 svchost.com 4560 3211FB~1.EXE 1196 svchost.com 2216 3211FB~1.EXE 3440 svchost.com 1292 3211FB~1.EXE 1188 svchost.com 3456 3211FB~1.EXE 1528 svchost.com 1756 3211FB~1.EXE 4528 svchost.com 2072 3211FB~1.EXE 4720 svchost.com 4796 3211FB~1.EXE 2948 svchost.com 3836 3211FB~1.EXE 3064 svchost.com 3648 3211FB~1.EXE 3444 svchost.com 700 3211FB~1.EXE 1876 svchost.com 3548 3211FB~1.EXE 3772 svchost.com 4596 3211FB~1.EXE 2468 svchost.com 556 3211FB~1.EXE 4400 svchost.com 1904 3211FB~1.EXE 4072 svchost.com 1348 3211FB~1.EXE 4024 svchost.com 1324 3211FB~1.EXE 1160 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 3211FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3211FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\svchost.com 3211FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3211FB~1.EXE File opened for modification C:\Windows\svchost.com 3211FB~1.EXE File opened for modification C:\Windows\svchost.com 3211FB~1.EXE File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\svchost.com 3211FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3211FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3211FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\svchost.com 3211FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3211FB~1.EXE File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3211FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\svchost.com 3211FB~1.EXE File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\svchost.com 3211FB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3211FB~1.EXE File opened for modification C:\Windows\svchost.com 3211FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3211FB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3211FB~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 3211FB~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2868 wrote to memory of 1900 2868 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe 84 PID 2868 wrote to memory of 1900 2868 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe 84 PID 2868 wrote to memory of 1900 2868 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe 84 PID 1900 wrote to memory of 796 1900 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe 86 PID 1900 wrote to memory of 796 1900 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe 86 PID 1900 wrote to memory of 796 1900 3211fb257bb634726e4897f65477708b_JaffaCakes118.exe 86 PID 796 wrote to memory of 4204 796 svchost.com 87 PID 796 wrote to memory of 4204 796 svchost.com 87 PID 796 wrote to memory of 4204 796 svchost.com 87 PID 4204 wrote to memory of 2296 4204 3211FB~1.EXE 88 PID 4204 wrote to memory of 2296 4204 3211FB~1.EXE 88 PID 4204 wrote to memory of 2296 4204 3211FB~1.EXE 88 PID 2296 wrote to memory of 3024 2296 svchost.com 89 PID 2296 wrote to memory of 3024 2296 svchost.com 89 PID 2296 wrote to memory of 3024 2296 svchost.com 89 PID 3024 wrote to memory of 4984 3024 3211FB~1.EXE 91 PID 3024 wrote to memory of 4984 3024 3211FB~1.EXE 91 PID 3024 wrote to memory of 4984 3024 3211FB~1.EXE 91 PID 4984 wrote to memory of 232 4984 svchost.com 92 PID 4984 wrote to memory of 232 4984 svchost.com 92 PID 4984 wrote to memory of 232 4984 svchost.com 92 PID 232 wrote to memory of 5052 232 3211FB~1.EXE 93 PID 232 wrote to memory of 5052 232 3211FB~1.EXE 93 PID 232 wrote to memory of 5052 232 3211FB~1.EXE 93 PID 5052 wrote to memory of 3584 5052 svchost.com 94 PID 5052 wrote to memory of 3584 5052 svchost.com 94 PID 5052 wrote to memory of 3584 5052 svchost.com 94 PID 3584 wrote to memory of 4488 3584 3211FB~1.EXE 95 PID 3584 wrote to memory of 4488 3584 3211FB~1.EXE 95 PID 3584 wrote to memory of 4488 3584 3211FB~1.EXE 95 PID 4488 wrote to memory of 4380 4488 svchost.com 96 PID 4488 wrote to memory of 4380 4488 svchost.com 96 PID 4488 wrote to memory of 4380 4488 svchost.com 96 PID 4380 wrote to memory of 5112 4380 3211FB~1.EXE 97 PID 4380 wrote to memory of 5112 4380 3211FB~1.EXE 97 PID 4380 wrote to memory of 5112 4380 3211FB~1.EXE 97 PID 5112 wrote to memory of 3588 5112 svchost.com 98 PID 5112 wrote to memory of 3588 5112 svchost.com 98 PID 5112 wrote to memory of 3588 5112 svchost.com 98 PID 3588 wrote to memory of 1464 3588 3211FB~1.EXE 99 PID 3588 wrote to memory of 1464 3588 3211FB~1.EXE 99 PID 3588 wrote to memory of 1464 3588 3211FB~1.EXE 99 PID 1464 wrote to memory of 3920 1464 svchost.com 100 PID 1464 wrote to memory of 3920 1464 svchost.com 100 PID 1464 wrote to memory of 3920 1464 svchost.com 100 PID 3920 wrote to memory of 1756 3920 3211FB~1.EXE 126 PID 3920 wrote to memory of 1756 3920 3211FB~1.EXE 126 PID 3920 wrote to memory of 1756 3920 3211FB~1.EXE 126 PID 1756 wrote to memory of 1616 1756 svchost.com 102 PID 1756 wrote to memory of 1616 1756 svchost.com 102 PID 1756 wrote to memory of 1616 1756 svchost.com 102 PID 1616 wrote to memory of 4288 1616 3211FB~1.EXE 103 PID 1616 wrote to memory of 4288 1616 3211FB~1.EXE 103 PID 1616 wrote to memory of 4288 1616 3211FB~1.EXE 103 PID 4288 wrote to memory of 4956 4288 svchost.com 104 PID 4288 wrote to memory of 4956 4288 svchost.com 104 PID 4288 wrote to memory of 4956 4288 svchost.com 104 PID 4956 wrote to memory of 2244 4956 3211FB~1.EXE 105 PID 4956 wrote to memory of 2244 4956 3211FB~1.EXE 105 PID 4956 wrote to memory of 2244 4956 3211FB~1.EXE 105 PID 2244 wrote to memory of 3044 2244 svchost.com 106 PID 2244 wrote to memory of 3044 2244 svchost.com 106 PID 2244 wrote to memory of 3044 2244 svchost.com 106 PID 3044 wrote to memory of 2864 3044 3211FB~1.EXE 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\3211fb257bb634726e4897f65477708b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3211fb257bb634726e4897f65477708b_JaffaCakes118.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211fb257bb634726e4897f65477708b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\3211fb257bb634726e4897f65477708b_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1464 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE20⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"23⤵
- Executes dropped EXE
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
PID:1928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"25⤵
- Executes dropped EXE
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE26⤵
- Executes dropped EXE
- Modifies registry class
PID:2728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"27⤵
- Executes dropped EXE
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE30⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"31⤵
- Executes dropped EXE
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"33⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE34⤵
- Executes dropped EXE
PID:4560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"35⤵
- Executes dropped EXE
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE36⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE38⤵
- Executes dropped EXE
PID:1292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
PID:3456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"41⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE42⤵
- Executes dropped EXE
PID:1756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"43⤵
- Executes dropped EXE
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE44⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"45⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
PID:4796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"47⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
PID:3836 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"49⤵
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"51⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"53⤵
- Executes dropped EXE
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"55⤵
- Executes dropped EXE
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"57⤵
- Executes dropped EXE
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE58⤵
- Executes dropped EXE
- Modifies registry class
PID:556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"59⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
PID:1904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"61⤵
- Executes dropped EXE
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE62⤵
- Executes dropped EXE
PID:1348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"63⤵
- Executes dropped EXE
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE66⤵
- Drops file in Windows directory
PID:232 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"67⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE68⤵PID:4060
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"69⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE70⤵PID:4768
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"71⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE72⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"73⤵PID:4116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE74⤵
- Modifies registry class
PID:1524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"75⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE76⤵
- Checks computer location settings
PID:2556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"77⤵PID:3748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE78⤵
- Drops file in Windows directory
- Modifies registry class
PID:1148 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"79⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE80⤵
- Drops file in Windows directory
- Modifies registry class
PID:1684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"81⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE82⤵
- Checks computer location settings
PID:2316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"83⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE84⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"85⤵
- Drops file in Windows directory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE86⤵
- Modifies registry class
PID:2400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"87⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE88⤵
- Checks computer location settings
PID:2816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"89⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE90⤵
- Modifies registry class
PID:4104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"91⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE92⤵
- Modifies registry class
PID:4460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"93⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE94⤵PID:1952
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"95⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE96⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"97⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE98⤵
- Checks computer location settings
PID:1348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"99⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE100⤵PID:2756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"101⤵
- Drops file in Windows directory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE102⤵
- Drops file in Windows directory
- Modifies registry class
PID:5084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"103⤵
- Drops file in Windows directory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE104⤵
- Checks computer location settings
PID:3500 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"105⤵
- Drops file in Windows directory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE106⤵PID:3948
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"107⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE108⤵
- Checks computer location settings
- Modifies registry class
PID:228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"109⤵
- Drops file in Windows directory
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE110⤵
- Checks computer location settings
- Modifies registry class
PID:1772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"111⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE112⤵
- Checks computer location settings
- Modifies registry class
PID:2344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"113⤵
- Drops file in Windows directory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE114⤵
- Modifies registry class
PID:4912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"115⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE116⤵
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"117⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE118⤵PID:2064
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"119⤵
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE120⤵PID:3888
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE"121⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3211FB~1.EXE122⤵PID:1028
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-