Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2024, 19:05
Behavioral task
behavioral1
Sample
7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe
Resource
win10v2004-20241007-en
General
-
Target
7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe
-
Size
502KB
-
MD5
2888973d357eb12705bb0c92baa7c232
-
SHA1
174a396157db6c0d11de1ea30008b4df87ffcc3e
-
SHA256
7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00
-
SHA512
0d93ed8a12b8e1661a6c11a23e5a4654ca04f99fe389fea31a9413646846f8d1457ecd741531f02158d988e43fb8421e51ef993aba5961ace0d4273b8e4874c3
-
SSDEEP
6144:k9F3jy8p6LcZTsl1nAmZaIxyhllmc2LW9Bygrh7UX/3TH5zyFgQjjjESeaJg3PfP:iZpi9/nAmZaIxglmc2KNJjESeaJAdGy
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000b000000023b5e-4.dat family_neshta behavioral2/files/0x000a000000023b60-10.dat family_neshta behavioral2/memory/2376-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1600-20-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3220-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2284-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4068-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/464-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3156-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3208-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3592-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2624-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1324-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4592-80-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002034d-89.dat family_neshta behavioral2/files/0x000100000002022f-98.dat family_neshta behavioral2/memory/112-111-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4964-115-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4892-123-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5040-127-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2792-135-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2956-145-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3228-150-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000021539-153.dat family_neshta behavioral2/files/0x00010000000214e2-166.dat family_neshta behavioral2/files/0x00010000000214e3-169.dat family_neshta behavioral2/memory/3504-167-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f70-186.dat family_neshta behavioral2/files/0x0001000000022f72-185.dat family_neshta behavioral2/files/0x0001000000016855-195.dat family_neshta behavioral2/files/0x00010000000167c9-194.dat family_neshta behavioral2/files/0x00010000000167cb-193.dat family_neshta behavioral2/files/0x00010000000167b0-192.dat family_neshta behavioral2/files/0x00010000000167ea-202.dat family_neshta behavioral2/files/0x000100000001dbdb-207.dat family_neshta behavioral2/files/0x0001000000016915-213.dat family_neshta behavioral2/memory/2916-222-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2508-226-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000100000001dbe7-212.dat family_neshta behavioral2/files/0x00010000000167c5-201.dat family_neshta behavioral2/files/0x0001000000016805-200.dat family_neshta behavioral2/files/0x0001000000022f33-176.dat family_neshta behavioral2/memory/1600-248-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3988-250-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2700-259-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3736-266-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3156-267-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4896-274-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2516-275-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3280-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4360-283-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3164-285-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1436-291-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3536-298-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4336-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2604-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4228-307-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4388-309-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3548-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2620-317-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/428-323-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/656-325-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3228-331-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1048-333-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7EEEB7~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 4404 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe 2376 svchost.com 1600 7EEEB7~1.EXE 3220 svchost.com 2284 7EEEB7~1.EXE 4068 svchost.com 464 7EEEB7~1.EXE 3156 svchost.com 3208 7EEEB7~1.EXE 3592 svchost.com 2624 7EEEB7~1.EXE 1324 svchost.com 4592 7EEEB7~1.EXE 112 svchost.com 4964 7EEEB7~1.EXE 4892 svchost.com 5040 7EEEB7~1.EXE 2792 svchost.com 2956 7EEEB7~1.EXE 3228 svchost.com 3504 7EEEB7~1.EXE 2916 svchost.com 2508 7EEEB7~1.EXE 1600 svchost.com 3988 7EEEB7~1.EXE 2700 svchost.com 3736 7EEEB7~1.EXE 3156 svchost.com 4896 7EEEB7~1.EXE 2516 svchost.com 3280 7EEEB7~1.EXE 4360 svchost.com 3164 7EEEB7~1.EXE 1436 svchost.com 3536 7EEEB7~1.EXE 4336 svchost.com 2604 7EEEB7~1.EXE 4228 svchost.com 4388 7EEEB7~1.EXE 3548 svchost.com 2620 7EEEB7~1.EXE 428 svchost.com 656 7EEEB7~1.EXE 3228 svchost.com 1048 7EEEB7~1.EXE 3252 svchost.com 2184 7EEEB7~1.EXE 3904 svchost.com 2744 7EEEB7~1.EXE 3692 svchost.com 3372 7EEEB7~1.EXE 4864 svchost.com 3600 7EEEB7~1.EXE 1384 svchost.com 2796 7EEEB7~1.EXE 4088 svchost.com 840 7EEEB7~1.EXE 1440 svchost.com 852 7EEEB7~1.EXE 5000 svchost.com 4524 7EEEB7~1.EXE 1916 svchost.com 4360 7EEEB7~1.EXE 1972 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\directx.sys 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7EEEB7~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7EEEB7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7EEEB7~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3980 wrote to memory of 4404 3980 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe 85 PID 3980 wrote to memory of 4404 3980 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe 85 PID 3980 wrote to memory of 4404 3980 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe 85 PID 4404 wrote to memory of 2376 4404 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe 86 PID 4404 wrote to memory of 2376 4404 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe 86 PID 4404 wrote to memory of 2376 4404 7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe 86 PID 2376 wrote to memory of 1600 2376 svchost.com 110 PID 2376 wrote to memory of 1600 2376 svchost.com 110 PID 2376 wrote to memory of 1600 2376 svchost.com 110 PID 1600 wrote to memory of 3220 1600 7EEEB7~1.EXE 88 PID 1600 wrote to memory of 3220 1600 7EEEB7~1.EXE 88 PID 1600 wrote to memory of 3220 1600 7EEEB7~1.EXE 88 PID 3220 wrote to memory of 2284 3220 svchost.com 89 PID 3220 wrote to memory of 2284 3220 svchost.com 89 PID 3220 wrote to memory of 2284 3220 svchost.com 89 PID 2284 wrote to memory of 4068 2284 7EEEB7~1.EXE 90 PID 2284 wrote to memory of 4068 2284 7EEEB7~1.EXE 90 PID 2284 wrote to memory of 4068 2284 7EEEB7~1.EXE 90 PID 4068 wrote to memory of 464 4068 svchost.com 91 PID 4068 wrote to memory of 464 4068 svchost.com 91 PID 4068 wrote to memory of 464 4068 svchost.com 91 PID 464 wrote to memory of 3156 464 7EEEB7~1.EXE 114 PID 464 wrote to memory of 3156 464 7EEEB7~1.EXE 114 PID 464 wrote to memory of 3156 464 7EEEB7~1.EXE 114 PID 3156 wrote to memory of 3208 3156 svchost.com 93 PID 3156 wrote to memory of 3208 3156 svchost.com 93 PID 3156 wrote to memory of 3208 3156 svchost.com 93 PID 3208 wrote to memory of 3592 3208 7EEEB7~1.EXE 94 PID 3208 wrote to memory of 3592 3208 7EEEB7~1.EXE 94 PID 3208 wrote to memory of 3592 3208 7EEEB7~1.EXE 94 PID 3592 wrote to memory of 2624 3592 svchost.com 95 PID 3592 wrote to memory of 2624 3592 svchost.com 95 PID 3592 wrote to memory of 2624 3592 svchost.com 95 PID 2624 wrote to memory of 1324 2624 7EEEB7~1.EXE 96 PID 2624 wrote to memory of 1324 2624 7EEEB7~1.EXE 96 PID 2624 wrote to memory of 1324 2624 7EEEB7~1.EXE 96 PID 1324 wrote to memory of 4592 1324 svchost.com 97 PID 1324 wrote to memory of 4592 1324 svchost.com 97 PID 1324 wrote to memory of 4592 1324 svchost.com 97 PID 4592 wrote to memory of 112 4592 7EEEB7~1.EXE 184 PID 4592 wrote to memory of 112 4592 7EEEB7~1.EXE 184 PID 4592 wrote to memory of 112 4592 7EEEB7~1.EXE 184 PID 112 wrote to memory of 4964 112 svchost.com 99 PID 112 wrote to memory of 4964 112 svchost.com 99 PID 112 wrote to memory of 4964 112 svchost.com 99 PID 4964 wrote to memory of 4892 4964 7EEEB7~1.EXE 188 PID 4964 wrote to memory of 4892 4964 7EEEB7~1.EXE 188 PID 4964 wrote to memory of 4892 4964 7EEEB7~1.EXE 188 PID 4892 wrote to memory of 5040 4892 svchost.com 102 PID 4892 wrote to memory of 5040 4892 svchost.com 102 PID 4892 wrote to memory of 5040 4892 svchost.com 102 PID 5040 wrote to memory of 2792 5040 7EEEB7~1.EXE 103 PID 5040 wrote to memory of 2792 5040 7EEEB7~1.EXE 103 PID 5040 wrote to memory of 2792 5040 7EEEB7~1.EXE 103 PID 2792 wrote to memory of 2956 2792 svchost.com 104 PID 2792 wrote to memory of 2956 2792 svchost.com 104 PID 2792 wrote to memory of 2956 2792 svchost.com 104 PID 2956 wrote to memory of 3228 2956 7EEEB7~1.EXE 130 PID 2956 wrote to memory of 3228 2956 7EEEB7~1.EXE 130 PID 2956 wrote to memory of 3228 2956 7EEEB7~1.EXE 130 PID 3228 wrote to memory of 3504 3228 svchost.com 106 PID 3228 wrote to memory of 3504 3228 svchost.com 106 PID 3228 wrote to memory of 3504 3228 svchost.com 106 PID 3504 wrote to memory of 2916 3504 7EEEB7~1.EXE 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe"C:\Users\Admin\AppData\Local\Temp\7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\7eeeb77d0854ab695e136bf68bffd879a1880d202a1888b0b4eafb6a75bcca00.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE12⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"19⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"23⤵
- Executes dropped EXE
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE24⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"25⤵
- Executes dropped EXE
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"27⤵
- Executes dropped EXE
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE28⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"29⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"33⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
PID:3164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"35⤵
- Executes dropped EXE
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
PID:3536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"37⤵
- Executes dropped EXE
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"39⤵
- Executes dropped EXE
PID:4228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE40⤵
- Executes dropped EXE
- Modifies registry class
PID:4388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE42⤵
- Executes dropped EXE
PID:2620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"43⤵
- Executes dropped EXE
PID:428 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"45⤵
- Executes dropped EXE
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE46⤵
- Executes dropped EXE
PID:1048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"49⤵
- Executes dropped EXE
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"51⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE52⤵
- Executes dropped EXE
- Modifies registry class
PID:3372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE54⤵
- Executes dropped EXE
PID:3600 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"57⤵
- Executes dropped EXE
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
PID:840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE60⤵
- Executes dropped EXE
PID:852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"63⤵
- Executes dropped EXE
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4360 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"65⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE66⤵
- System Location Discovery: System Language Discovery
PID:1436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"67⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE68⤵
- Checks computer location settings
- Modifies registry class
PID:4584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"69⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE70⤵
- Drops file in Windows directory
- Modifies registry class
PID:2408 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"71⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE72⤵
- Drops file in Windows directory
PID:3896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"73⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE74⤵PID:4760
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE76⤵
- Checks computer location settings
PID:3516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"77⤵
- Drops file in Windows directory
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE78⤵PID:2980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"79⤵PID:640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE80⤵
- Modifies registry class
PID:4636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"81⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE82⤵
- Checks computer location settings
PID:1712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"83⤵PID:3964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE84⤵
- Checks computer location settings
PID:1404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"85⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE86⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"87⤵
- System Location Discovery: System Language Discovery
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE88⤵PID:2796
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"89⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE90⤵
- Drops file in Windows directory
- Modifies registry class
PID:4204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"91⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE92⤵
- Modifies registry class
PID:5000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"93⤵
- System Location Discovery: System Language Discovery
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE94⤵
- Checks computer location settings
PID:1916 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"95⤵
- Drops file in Windows directory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE96⤵
- Modifies registry class
PID:2672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"97⤵PID:112
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE98⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE100⤵
- Modifies registry class
PID:4584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"101⤵
- System Location Discovery: System Language Discovery
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE102⤵
- Modifies registry class
PID:2492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"103⤵
- Drops file in Windows directory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE104⤵
- Checks computer location settings
- Modifies registry class
PID:4540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"105⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE106⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"107⤵PID:4308
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE108⤵PID:2112
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"109⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE110⤵PID:4912
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"111⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE112⤵
- Drops file in Windows directory
PID:2248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"113⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE114⤵
- Checks computer location settings
- Modifies registry class
PID:1992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"115⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE116⤵
- Modifies registry class
PID:4068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"117⤵PID:5088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE118⤵PID:4008
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"119⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE120⤵
- Checks computer location settings
PID:4524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE"121⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7EEEB7~1.EXE122⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:8
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-