Analysis
-
max time kernel
141s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 19:14
Behavioral task
behavioral1
Sample
f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe
Resource
win10v2004-20241007-en
General
-
Target
f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe
-
Size
314KB
-
MD5
d0102ba2c59700add4cdcdbed01e165b
-
SHA1
fb3a0505fcd26190c782a048ef665196a1e33084
-
SHA256
f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674
-
SHA512
e2603298bba575c79f21a5f50dd029ad99c0aa6fb772af5facc374719b042cd23552fa0aa01de4111c22d086920f3375c8478e901d65047b5e9f222bed3218c0
-
SSDEEP
6144:k9OeySe8AIqpoHbnDns1ND97deKzC/IUeRUqGntyH7xOc6H5c6HcT66vlmrq:QyV8hEoHbI3x/+eSaH
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000b000000023b97-17.dat family_neshta behavioral2/files/0x000a000000023b9b-23.dat family_neshta behavioral2/memory/4440-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2904-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3976-42-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4316-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3540-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2568-65-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4992-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/404-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4708-78-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2964-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4336-90-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/908-94-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020247-110.dat family_neshta behavioral2/files/0x0006000000020253-109.dat family_neshta behavioral2/files/0x000600000002024b-108.dat family_neshta behavioral2/files/0x000400000002036b-116.dat family_neshta behavioral2/memory/4084-124-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1072-135-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1524-137-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4744-147-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/912-148-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3216-152-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000021511-175.dat family_neshta behavioral2/files/0x0001000000021510-174.dat family_neshta behavioral2/files/0x000100000002150f-173.dat family_neshta behavioral2/memory/4080-178-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4380-206-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167d2-205.dat family_neshta behavioral2/files/0x00010000000167b7-204.dat family_neshta behavioral2/files/0x0001000000022fab-190.dat family_neshta behavioral2/files/0x0001000000022fad-189.dat family_neshta behavioral2/files/0x00010000000167cc-214.dat family_neshta behavioral2/files/0x000100000001680c-213.dat family_neshta behavioral2/files/0x00010000000167f0-218.dat family_neshta behavioral2/memory/3332-233-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4404-237-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1064-244-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3840-253-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/752-268-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5048-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2260-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2692-281-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3716-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1728-294-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1996-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4472-302-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3328-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4876-310-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/572-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1312-313-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2492-319-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4100-321-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1564-327-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2672-329-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4860-335-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1592-337-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4904-343-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/112-350-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3820-351-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1284-353-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3892-359-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/668-361-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation F12ADC~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 2784 f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe 2596 svchost.exe 1772 f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe 1924 svchost.exe 4440 svchost.com 2904 F12ADC~1.EXE 3976 svchost.com 4316 F12ADC~1.EXE 3540 svchost.com 2568 F12ADC~1.EXE 4992 svchost.com 404 F12ADC~1.EXE 4708 svchost.com 2964 F12ADC~1.EXE 4336 svchost.com 908 F12ADC~1.EXE 4084 svchost.com 1072 F12ADC~1.EXE 1524 svchost.com 4744 F12ADC~1.EXE 912 svchost.com 3216 F12ADC~1.EXE 4080 svchost.com 4380 F12ADC~1.EXE 3332 svchost.com 4404 F12ADC~1.EXE 1064 svchost.com 3840 F12ADC~1.EXE 752 svchost.com 5048 F12ADC~1.EXE 2260 svchost.com 2692 F12ADC~1.EXE 3716 svchost.com 1728 F12ADC~1.EXE 1996 svchost.com 4472 F12ADC~1.EXE 3328 svchost.com 4876 F12ADC~1.EXE 572 svchost.com 1312 F12ADC~1.EXE 2492 svchost.com 4100 F12ADC~1.EXE 1564 svchost.com 2672 F12ADC~1.EXE 4860 svchost.com 1592 F12ADC~1.EXE 4904 svchost.com 112 F12ADC~1.EXE 3820 svchost.com 1284 F12ADC~1.EXE 3892 svchost.com 668 F12ADC~1.EXE 2996 svchost.com 4468 F12ADC~1.EXE 4380 svchost.com 868 F12ADC~1.EXE 1144 svchost.com 1036 F12ADC~1.EXE 1844 svchost.com 5044 F12ADC~1.EXE 2856 svchost.com 2044 F12ADC~1.EXE 2648 svchost.com 5036 F12ADC~1.EXE -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" F12ADC~1.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe F12ADC~1.EXE File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe F12ADC~1.EXE File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe F12ADC~1.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe F12ADC~1.EXE File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe F12ADC~1.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe F12ADC~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe F12ADC~1.EXE File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe F12ADC~1.EXE File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\directx.sys F12ADC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F12ADC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F12ADC~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings F12ADC~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4060 wrote to memory of 2784 4060 f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe 85 PID 4060 wrote to memory of 2784 4060 f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe 85 PID 4060 wrote to memory of 2784 4060 f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe 85 PID 2784 wrote to memory of 2596 2784 f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe 86 PID 2784 wrote to memory of 2596 2784 f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe 86 PID 2784 wrote to memory of 2596 2784 f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe 86 PID 2596 wrote to memory of 1772 2596 svchost.exe 87 PID 2596 wrote to memory of 1772 2596 svchost.exe 87 PID 2596 wrote to memory of 1772 2596 svchost.exe 87 PID 1772 wrote to memory of 4440 1772 f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe 89 PID 1772 wrote to memory of 4440 1772 f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe 89 PID 1772 wrote to memory of 4440 1772 f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe 89 PID 4440 wrote to memory of 2904 4440 svchost.com 90 PID 4440 wrote to memory of 2904 4440 svchost.com 90 PID 4440 wrote to memory of 2904 4440 svchost.com 90 PID 2904 wrote to memory of 3976 2904 F12ADC~1.EXE 91 PID 2904 wrote to memory of 3976 2904 F12ADC~1.EXE 91 PID 2904 wrote to memory of 3976 2904 F12ADC~1.EXE 91 PID 3976 wrote to memory of 4316 3976 svchost.com 92 PID 3976 wrote to memory of 4316 3976 svchost.com 92 PID 3976 wrote to memory of 4316 3976 svchost.com 92 PID 4316 wrote to memory of 3540 4316 F12ADC~1.EXE 94 PID 4316 wrote to memory of 3540 4316 F12ADC~1.EXE 94 PID 4316 wrote to memory of 3540 4316 F12ADC~1.EXE 94 PID 3540 wrote to memory of 2568 3540 svchost.com 95 PID 3540 wrote to memory of 2568 3540 svchost.com 95 PID 3540 wrote to memory of 2568 3540 svchost.com 95 PID 2568 wrote to memory of 4992 2568 F12ADC~1.EXE 96 PID 2568 wrote to memory of 4992 2568 F12ADC~1.EXE 96 PID 2568 wrote to memory of 4992 2568 F12ADC~1.EXE 96 PID 4992 wrote to memory of 404 4992 svchost.com 97 PID 4992 wrote to memory of 404 4992 svchost.com 97 PID 4992 wrote to memory of 404 4992 svchost.com 97 PID 404 wrote to memory of 4708 404 F12ADC~1.EXE 98 PID 404 wrote to memory of 4708 404 F12ADC~1.EXE 98 PID 404 wrote to memory of 4708 404 F12ADC~1.EXE 98 PID 4708 wrote to memory of 2964 4708 svchost.com 99 PID 4708 wrote to memory of 2964 4708 svchost.com 99 PID 4708 wrote to memory of 2964 4708 svchost.com 99 PID 2964 wrote to memory of 4336 2964 F12ADC~1.EXE 100 PID 2964 wrote to memory of 4336 2964 F12ADC~1.EXE 100 PID 2964 wrote to memory of 4336 2964 F12ADC~1.EXE 100 PID 4336 wrote to memory of 908 4336 svchost.com 101 PID 4336 wrote to memory of 908 4336 svchost.com 101 PID 4336 wrote to memory of 908 4336 svchost.com 101 PID 908 wrote to memory of 4084 908 F12ADC~1.EXE 102 PID 908 wrote to memory of 4084 908 F12ADC~1.EXE 102 PID 908 wrote to memory of 4084 908 F12ADC~1.EXE 102 PID 4084 wrote to memory of 1072 4084 svchost.com 103 PID 4084 wrote to memory of 1072 4084 svchost.com 103 PID 4084 wrote to memory of 1072 4084 svchost.com 103 PID 1072 wrote to memory of 1524 1072 F12ADC~1.EXE 104 PID 1072 wrote to memory of 1524 1072 F12ADC~1.EXE 104 PID 1072 wrote to memory of 1524 1072 F12ADC~1.EXE 104 PID 1524 wrote to memory of 4744 1524 svchost.com 200 PID 1524 wrote to memory of 4744 1524 svchost.com 200 PID 1524 wrote to memory of 4744 1524 svchost.com 200 PID 4744 wrote to memory of 912 4744 F12ADC~1.EXE 202 PID 4744 wrote to memory of 912 4744 F12ADC~1.EXE 202 PID 4744 wrote to memory of 912 4744 F12ADC~1.EXE 202 PID 912 wrote to memory of 3216 912 svchost.com 107 PID 912 wrote to memory of 3216 912 svchost.com 107 PID 912 wrote to memory of 3216 912 svchost.com 107 PID 3216 wrote to memory of 4080 3216 F12ADC~1.EXE 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe"C:\Users\Admin\AppData\Local\Temp\f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\f12adc8da042e58dc97e390a044284a266adad7949a177238b1d7e72e6bc4674.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3976 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"15⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"23⤵
- Executes dropped EXE
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE24⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"25⤵
- Executes dropped EXE
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE26⤵
- Executes dropped EXE
- Modifies registry class
PID:4404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE28⤵
- Executes dropped EXE
PID:3840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"29⤵
- Executes dropped EXE
PID:752 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
PID:5048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"31⤵
- Executes dropped EXE
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE32⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"35⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE36⤵
- Executes dropped EXE
PID:4472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE38⤵
- Executes dropped EXE
PID:4876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"39⤵
- Executes dropped EXE
PID:572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1312 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"41⤵
- Executes dropped EXE
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE42⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"43⤵
- Executes dropped EXE
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
PID:2672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"45⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE46⤵
- Executes dropped EXE
PID:1592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"47⤵
- Executes dropped EXE
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
PID:112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"49⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"51⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
PID:668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"53⤵
- Executes dropped EXE
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE54⤵
- Executes dropped EXE
PID:4468 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
PID:1036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"59⤵
- Executes dropped EXE
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
PID:5044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"61⤵
- Executes dropped EXE
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:5036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"65⤵
- Drops file in Windows directory
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE66⤵
- System Location Discovery: System Language Discovery
PID:1224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"67⤵PID:4684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE68⤵
- System Location Discovery: System Language Discovery
PID:1280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"69⤵PID:3532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE70⤵
- Drops file in Windows directory
- Modifies registry class
PID:3520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"71⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE72⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"73⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE74⤵PID:4144
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"75⤵PID:4352
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE76⤵
- Modifies registry class
PID:372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"77⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE78⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:4720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"79⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE80⤵
- Modifies registry class
PID:2436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"81⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE82⤵
- Drops file in Windows directory
PID:1136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"83⤵PID:5000
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE84⤵
- Checks computer location settings
- Modifies registry class
PID:2076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"85⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE86⤵
- Checks computer location settings
PID:704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"87⤵
- System Location Discovery: System Language Discovery
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE88⤵
- Drops file in Windows directory
PID:4976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"89⤵PID:4636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE90⤵
- Checks computer location settings
PID:2604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"91⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE92⤵
- Drops file in Windows directory
PID:3980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"93⤵PID:4404
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE94⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"95⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE96⤵
- Checks computer location settings
PID:3824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"97⤵PID:3764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE98⤵
- Modifies registry class
PID:2444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"99⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE100⤵
- Drops file in Windows directory
PID:2588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"101⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE102⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"103⤵
- System Location Discovery: System Language Discovery
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE104⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"105⤵
- Drops file in Windows directory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE106⤵
- Checks computer location settings
- Modifies registry class
PID:816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"107⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE108⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"109⤵
- System Location Discovery: System Language Discovery
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE110⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE112⤵PID:1756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"113⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE114⤵
- Drops file in Windows directory
PID:724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"115⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE116⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"117⤵
- Drops file in Windows directory
PID:912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE118⤵
- Modifies registry class
PID:3260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"119⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE120⤵
- Drops file in Windows directory
- Modifies registry class
PID:3892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE"121⤵
- System Location Discovery: System Language Discovery
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F12ADC~1.EXE122⤵
- Modifies registry class
PID:2732
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-