Analysis
-
max time kernel
42s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-10-2024 17:25
Behavioral task
behavioral1
Sample
5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe
Resource
win10v2004-20241007-en
General
-
Target
5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe
-
Size
197KB
-
MD5
fe0d608975429428df47cdeffe476d10
-
SHA1
d5c8a79c25427dcab99f0c1acf4f826e60747849
-
SHA256
5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2
-
SHA512
a55c406636ec3117e7e8fa7bbf3bed53b045c9d510375762b591298c24ce5c124a5c02d404b863a88b5f43cff175eb4e0330c91fa0821a1f4f66a672b790c404
-
SSDEEP
3072:sr85COoPZMYGdIRhGEkxutMgYd/bcTixUvOOOOOOOOOOOOOOOOOOOOOOOOOOOOOg:k9bsERVYd/YTixUdgxrOfc29
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule behavioral2/files/0x0008000000023ccc-4.dat family_neshta behavioral2/files/0x0007000000023cd1-10.dat family_neshta behavioral2/memory/64-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2804-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/540-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2604-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3620-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2676-51-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1108-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1116-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2844-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1816-78-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000600000002024b-82.dat family_neshta behavioral2/files/0x00070000000202b3-81.dat family_neshta behavioral2/files/0x000400000002036a-87.dat family_neshta behavioral2/files/0x000400000002036b-93.dat family_neshta behavioral2/files/0x0004000000020378-69.dat family_neshta behavioral2/memory/1264-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5092-111-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3812-112-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4092-123-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5056-143-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000021510-151.dat family_neshta behavioral2/files/0x000100000002150f-150.dat family_neshta behavioral2/files/0x0001000000021564-131.dat family_neshta behavioral2/files/0x00010000000167b7-172.dat family_neshta behavioral2/files/0x0001000000016809-171.dat family_neshta behavioral2/memory/2024-189-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/628-201-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1588-207-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2096-190-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4544-219-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4028-178-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022fab-170.dat family_neshta behavioral2/files/0x0001000000022fad-169.dat family_neshta behavioral2/files/0x0001000000022f6c-168.dat family_neshta behavioral2/files/0x0001000000022f6f-167.dat family_neshta behavioral2/files/0x0001000000022fac-166.dat family_neshta behavioral2/files/0x0001000000022f6e-164.dat family_neshta behavioral2/files/0x0001000000022f6d-163.dat family_neshta behavioral2/memory/3192-129-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0002000000020342-128.dat family_neshta behavioral2/memory/776-231-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4540-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1852-242-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3636-260-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1688-266-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3112-273-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4524-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2832-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1396-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1116-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3268-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4644-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2324-304-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4004-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1264-312-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5092-314-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2924-320-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3428-327-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4092-328-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3056-335-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4672-336-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4868-338-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXEdescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 5F73C5~1.EXE -
Executes dropped EXE 64 IoCs
Processes:
5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exesvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.compid Process 2100 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe 64 svchost.com 2804 5F73C5~1.EXE 540 svchost.com 2604 5F73C5~1.EXE 3620 svchost.com 2676 5F73C5~1.EXE 1108 svchost.com 1116 5F73C5~1.EXE 2844 svchost.com 1816 5F73C5~1.EXE 1264 svchost.com 5092 5F73C5~1.EXE 3812 svchost.com 4092 5F73C5~1.EXE 3192 svchost.com 5056 5F73C5~1.EXE 4028 svchost.com 2024 5F73C5~1.EXE 2096 svchost.com 628 5F73C5~1.EXE 1588 svchost.com 4544 5F73C5~1.EXE 776 svchost.com 4540 5F73C5~1.EXE 1852 svchost.com 3636 5F73C5~1.EXE 1688 svchost.com 3112 5F73C5~1.EXE 4524 svchost.com 2832 5F73C5~1.EXE 1396 svchost.com 1116 5F73C5~1.EXE 3268 svchost.com 4644 5F73C5~1.EXE 2324 svchost.com 4004 5F73C5~1.EXE 1264 svchost.com 5092 5F73C5~1.EXE 2924 svchost.com 3428 5F73C5~1.EXE 4092 svchost.com 3056 5F73C5~1.EXE 4672 svchost.com 4868 5F73C5~1.EXE 4548 svchost.com 3416 5F73C5~1.EXE 3084 svchost.com 4216 5F73C5~1.EXE 4400 svchost.com 3528 5F73C5~1.EXE 2104 svchost.com 1536 5F73C5~1.EXE 4312 svchost.com 836 5F73C5~1.EXE 1748 svchost.com 4368 5F73C5~1.EXE 5108 svchost.com 2440 5F73C5~1.EXE 4964 svchost.com 3580 5F73C5~1.EXE 3144 svchost.com 624 5F73C5~1.EXE 3304 svchost.com -
Modifies system executable filetype association 2 TTPs 2 IoCs
Processes:
5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe5F73C5~1.EXEdescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 5F73C5~1.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe5F73C5~1.EXE5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exedescription ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 5F73C5~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 5F73C5~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaws.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 5F73C5~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 5F73C5~1.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 5F73C5~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe -
Drops file in Windows directory 64 IoCs
Processes:
5F73C5~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXEsvchost.comsvchost.com5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXEsvchost.com5F73C5~1.EXE5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com5F73C5~1.EXEsvchost.comsvchost.com5F73C5~1.EXE5F73C5~1.EXEsvchost.com5F73C5~1.EXE5F73C5~1.EXEsvchost.com5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXEsvchost.comsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXEsvchost.comsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com5F73C5~1.EXEsvchost.comdescription ioc Process File opened for modification C:\Windows\svchost.com 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 5F73C5~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 5F73C5~1.EXE File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.com5F73C5~1.EXEsvchost.comsvchost.com5F73C5~1.EXE5F73C5~1.EXEsvchost.comsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXEsvchost.comsvchost.com5F73C5~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com5F73C5~1.EXE5F73C5~1.EXEsvchost.com5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXEsvchost.comsvchost.com5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXEsvchost.comsvchost.com5F73C5~1.EXEsvchost.comsvchost.com5F73C5~1.EXE5F73C5~1.EXEsvchost.com5F73C5~1.EXE5F73C5~1.EXEsvchost.comsvchost.com5F73C5~1.EXEsvchost.comsvchost.comsvchost.com5F73C5~1.EXEsvchost.comsvchost.comsvchost.com5F73C5~1.EXE5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com5F73C5~1.EXEsvchost.comdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5F73C5~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
Processes:
5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXE5F73C5~1.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 5F73C5~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exesvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEsvchost.com5F73C5~1.EXEdescription pid Process procid_target PID 3800 wrote to memory of 2100 3800 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe 84 PID 3800 wrote to memory of 2100 3800 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe 84 PID 3800 wrote to memory of 2100 3800 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe 84 PID 2100 wrote to memory of 64 2100 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe 85 PID 2100 wrote to memory of 64 2100 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe 85 PID 2100 wrote to memory of 64 2100 5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe 85 PID 64 wrote to memory of 2804 64 svchost.com 86 PID 64 wrote to memory of 2804 64 svchost.com 86 PID 64 wrote to memory of 2804 64 svchost.com 86 PID 2804 wrote to memory of 540 2804 5F73C5~1.EXE 87 PID 2804 wrote to memory of 540 2804 5F73C5~1.EXE 87 PID 2804 wrote to memory of 540 2804 5F73C5~1.EXE 87 PID 540 wrote to memory of 2604 540 svchost.com 88 PID 540 wrote to memory of 2604 540 svchost.com 88 PID 540 wrote to memory of 2604 540 svchost.com 88 PID 2604 wrote to memory of 3620 2604 5F73C5~1.EXE 89 PID 2604 wrote to memory of 3620 2604 5F73C5~1.EXE 89 PID 2604 wrote to memory of 3620 2604 5F73C5~1.EXE 89 PID 3620 wrote to memory of 2676 3620 svchost.com 90 PID 3620 wrote to memory of 2676 3620 svchost.com 90 PID 3620 wrote to memory of 2676 3620 svchost.com 90 PID 2676 wrote to memory of 1108 2676 5F73C5~1.EXE 91 PID 2676 wrote to memory of 1108 2676 5F73C5~1.EXE 91 PID 2676 wrote to memory of 1108 2676 5F73C5~1.EXE 91 PID 1108 wrote to memory of 1116 1108 svchost.com 116 PID 1108 wrote to memory of 1116 1108 svchost.com 116 PID 1108 wrote to memory of 1116 1108 svchost.com 116 PID 1116 wrote to memory of 2844 1116 5F73C5~1.EXE 93 PID 1116 wrote to memory of 2844 1116 5F73C5~1.EXE 93 PID 1116 wrote to memory of 2844 1116 5F73C5~1.EXE 93 PID 2844 wrote to memory of 1816 2844 svchost.com 94 PID 2844 wrote to memory of 1816 2844 svchost.com 94 PID 2844 wrote to memory of 1816 2844 svchost.com 94 PID 1816 wrote to memory of 1264 1816 5F73C5~1.EXE 121 PID 1816 wrote to memory of 1264 1816 5F73C5~1.EXE 121 PID 1816 wrote to memory of 1264 1816 5F73C5~1.EXE 121 PID 1264 wrote to memory of 5092 1264 svchost.com 157 PID 1264 wrote to memory of 5092 1264 svchost.com 157 PID 1264 wrote to memory of 5092 1264 svchost.com 157 PID 5092 wrote to memory of 3812 5092 5F73C5~1.EXE 97 PID 5092 wrote to memory of 3812 5092 5F73C5~1.EXE 97 PID 5092 wrote to memory of 3812 5092 5F73C5~1.EXE 97 PID 3812 wrote to memory of 4092 3812 svchost.com 159 PID 3812 wrote to memory of 4092 3812 svchost.com 159 PID 3812 wrote to memory of 4092 3812 svchost.com 159 PID 4092 wrote to memory of 3192 4092 5F73C5~1.EXE 160 PID 4092 wrote to memory of 3192 4092 5F73C5~1.EXE 160 PID 4092 wrote to memory of 3192 4092 5F73C5~1.EXE 160 PID 3192 wrote to memory of 5056 3192 svchost.com 100 PID 3192 wrote to memory of 5056 3192 svchost.com 100 PID 3192 wrote to memory of 5056 3192 svchost.com 100 PID 5056 wrote to memory of 4028 5056 5F73C5~1.EXE 101 PID 5056 wrote to memory of 4028 5056 5F73C5~1.EXE 101 PID 5056 wrote to memory of 4028 5056 5F73C5~1.EXE 101 PID 4028 wrote to memory of 2024 4028 svchost.com 102 PID 4028 wrote to memory of 2024 4028 svchost.com 102 PID 4028 wrote to memory of 2024 4028 svchost.com 102 PID 2024 wrote to memory of 2096 2024 5F73C5~1.EXE 103 PID 2024 wrote to memory of 2096 2024 5F73C5~1.EXE 103 PID 2024 wrote to memory of 2096 2024 5F73C5~1.EXE 103 PID 2096 wrote to memory of 628 2096 svchost.com 104 PID 2096 wrote to memory of 628 2096 svchost.com 104 PID 2096 wrote to memory of 628 2096 svchost.com 104 PID 628 wrote to memory of 1588 628 5F73C5~1.EXE 200
Processes
-
C:\Users\Admin\AppData\Local\Temp\5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe"C:\Users\Admin\AppData\Local\Temp\5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\5f73c593edc3eaa411285100e60f3799a38964194d8e8c70e27fa41a975fadd2N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"19⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"21⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"23⤵
- Executes dropped EXE
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE24⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"25⤵
- Executes dropped EXE
PID:776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE26⤵
- Executes dropped EXE
PID:4540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"27⤵
- Executes dropped EXE
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE28⤵
- Executes dropped EXE
PID:3636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"29⤵
- Executes dropped EXE
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"31⤵
- Executes dropped EXE
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE32⤵
- Executes dropped EXE
PID:2832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"33⤵
- Executes dropped EXE
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE34⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE36⤵
- Executes dropped EXE
PID:4644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"37⤵
- Executes dropped EXE
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE38⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE40⤵
- Executes dropped EXE
- Modifies registry class
PID:5092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"41⤵
- Executes dropped EXE
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE42⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"43⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"45⤵
- Executes dropped EXE
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"47⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"49⤵
- Executes dropped EXE
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"51⤵
- Executes dropped EXE
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE52⤵
- Executes dropped EXE
PID:3528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"55⤵
- Executes dropped EXE
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE56⤵
- Executes dropped EXE
PID:836 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"57⤵
- Executes dropped EXE
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE60⤵
- Executes dropped EXE
PID:2440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"61⤵
- Executes dropped EXE
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"63⤵
- Executes dropped EXE
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE64⤵
- Executes dropped EXE
PID:624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE66⤵PID:3368
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"67⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE68⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"69⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE70⤵
- Checks computer location settings
- Modifies registry class
PID:5092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"71⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE72⤵
- Checks computer location settings
- Modifies registry class
PID:4092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"73⤵PID:3192
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE74⤵
- Modifies registry class
PID:4240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE76⤵
- Checks computer location settings
PID:3536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"77⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE78⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"79⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE80⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"81⤵
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE82⤵
- Checks computer location settings
- Drops file in Windows directory
PID:812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"83⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE84⤵
- Drops file in Windows directory
PID:4280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"85⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE86⤵PID:3256
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"87⤵
- System Location Discovery: System Language Discovery
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE88⤵
- Modifies registry class
PID:3592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"89⤵
- System Location Discovery: System Language Discovery
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE90⤵
- Drops file in Windows directory
- Modifies registry class
PID:1472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"91⤵
- System Location Discovery: System Language Discovery
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE92⤵
- Checks computer location settings
- Modifies registry class
PID:1396 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"93⤵
- System Location Discovery: System Language Discovery
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE94⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
PID:924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"95⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE96⤵
- Drops file in Windows directory
PID:1900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"97⤵PID:3288
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE98⤵
- Drops file in Windows directory
- Modifies registry class
PID:940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"99⤵
- Drops file in Windows directory
PID:448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE100⤵
- Modifies registry class
PID:1732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"101⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE102⤵PID:2460
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"103⤵
- Drops file in Windows directory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE104⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"105⤵
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE106⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"107⤵
- System Location Discovery: System Language Discovery
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE108⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"109⤵PID:4516
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE110⤵PID:3188
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE112⤵
- Modifies registry class
PID:2284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"113⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE114⤵
- Drops file in Windows directory
- Modifies registry class
PID:216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"115⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE116⤵
- Checks computer location settings
- Modifies registry class
PID:3868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"117⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE118⤵
- Checks computer location settings
PID:4012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"119⤵PID:3920
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE120⤵
- Drops file in Windows directory
PID:2432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE"121⤵
- Drops file in Windows directory
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5F73C5~1.EXE122⤵PID:4512
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-