Analysis
-
max time kernel
45s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 21:37
Behavioral task
behavioral1
Sample
36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe
Resource
win10v2004-20241007-en
General
-
Target
36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe
-
Size
333KB
-
MD5
c182ece96d6d9a64a0c0464b22f35371
-
SHA1
4af9dcd8ba229f967a7573a0ca73aa24c5690a98
-
SHA256
36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c
-
SHA512
3aebf790625f3cc19f6e56e48b575199f8ff20caaf9480cbf864a9ed22e7178f0378d5254e65893246e177083120796de453ffb3c258446a0c590e28d04b636f
-
SSDEEP
3072:sr85Cn4BN6e7qQ0x6Nvx1p5GnKIL72zgO5+r85C:k9n66e7qR2x1p5GnKIL7P9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule behavioral2/files/0x0008000000023c73-4.dat family_neshta behavioral2/files/0x0007000000023c78-10.dat family_neshta behavioral2/memory/2284-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1744-26-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3712-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1852-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4724-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4124-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2264-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3544-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2640-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2876-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4784-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020216-89.dat family_neshta behavioral2/memory/688-95-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000700000002027e-88.dat family_neshta behavioral2/files/0x0004000000020343-87.dat family_neshta behavioral2/files/0x0004000000020309-108.dat family_neshta behavioral2/files/0x000600000002022d-109.dat family_neshta behavioral2/memory/3940-110-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000100000002028f-107.dat family_neshta behavioral2/memory/4484-121-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2400-122-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4036-126-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000021533-140.dat family_neshta behavioral2/memory/4208-145-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f29-154.dat family_neshta behavioral2/files/0x0001000000022f26-158.dat family_neshta behavioral2/memory/4396-177-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f69-176.dat family_neshta behavioral2/files/0x0001000000022f68-160.dat family_neshta behavioral2/files/0x00010000000214d8-152.dat family_neshta behavioral2/files/0x00010000000214da-151.dat family_neshta behavioral2/files/0x00010000000214d9-150.dat family_neshta behavioral2/memory/4212-192-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167cb-202.dat family_neshta behavioral2/files/0x000100000001680d-201.dat family_neshta behavioral2/files/0x00010000000167d3-200.dat family_neshta behavioral2/files/0x000100000001685d-199.dat family_neshta behavioral2/memory/4604-218-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167cf-198.dat family_neshta behavioral2/files/0x00010000000167d1-197.dat family_neshta behavioral2/files/0x00010000000167b6-196.dat family_neshta behavioral2/files/0x0001000000016808-195.dat family_neshta behavioral2/memory/4744-219-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3340-229-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2008-232-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1920-246-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/692-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4772-253-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3652-263-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/800-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2700-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4128-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4668-285-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1956-292-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4952-293-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3588-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/892-301-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2256-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3092-309-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4008-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4844-317-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4948-319-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXEdescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 36E228~1.EXE -
Executes dropped EXE 64 IoCs
Processes:
36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exesvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.compid Process 2824 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe 2284 svchost.com 1744 36E228~1.EXE 3712 svchost.com 1852 36E228~1.EXE 4724 svchost.com 4124 36E228~1.EXE 2264 svchost.com 3544 36E228~1.EXE 2640 svchost.com 2876 36E228~1.EXE 4784 svchost.com 688 36E228~1.EXE 3940 svchost.com 4484 36E228~1.EXE 2400 svchost.com 4036 36E228~1.EXE 4208 svchost.com 4396 36E228~1.EXE 4212 svchost.com 4604 36E228~1.EXE 4744 svchost.com 3340 36E228~1.EXE 2008 svchost.com 1920 36E228~1.EXE 4772 svchost.com 692 36E228~1.EXE 3652 svchost.com 800 36E228~1.EXE 2700 svchost.com 4128 36E228~1.EXE 4668 svchost.com 1956 36E228~1.EXE 4952 svchost.com 3588 36E228~1.EXE 892 svchost.com 2256 36E228~1.EXE 3092 svchost.com 4008 36E228~1.EXE 4844 svchost.com 4948 36E228~1.EXE 2400 svchost.com 4780 36E228~1.EXE 3524 svchost.com 2000 36E228~1.EXE 4632 svchost.com 2156 36E228~1.EXE 4980 svchost.com 2188 36E228~1.EXE 2952 svchost.com 1148 36E228~1.EXE 644 svchost.com 2164 36E228~1.EXE 4592 svchost.com 4624 36E228~1.EXE 3060 svchost.com 4476 36E228~1.EXE 2556 svchost.com 2292 36E228~1.EXE 3288 svchost.com 2516 36E228~1.EXE 3872 svchost.com 4404 36E228~1.EXE 1704 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exedescription ioc Process File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\java.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe -
Drops file in Windows directory 64 IoCs
Processes:
36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exesvchost.com36E228~1.EXEsvchost.comsvchost.com36E228~1.EXEsvchost.com36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXEsvchost.comsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXE36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXE36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXE36E228~1.EXE36E228~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com36E228~1.EXE36E228~1.EXEsvchost.comsvchost.com36E228~1.EXE36E228~1.EXEsvchost.com36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXEsvchost.com36E228~1.EXE36E228~1.EXE36E228~1.EXEdescription ioc Process File opened for modification C:\Windows\svchost.com 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 36E228~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\svchost.com 36E228~1.EXE File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\svchost.com 36E228~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 36E228~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 36E228~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 36E228~1.EXE File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\svchost.com 36E228~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 36E228~1.EXE File opened for modification C:\Windows\svchost.com 36E228~1.EXE File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 36E228~1.EXE File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 36E228~1.EXE File opened for modification C:\Windows\svchost.com 36E228~1.EXE File opened for modification C:\Windows\svchost.com 36E228~1.EXE File opened for modification C:\Windows\svchost.com 36E228~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 36E228~1.EXE File opened for modification C:\Windows\directx.sys 36E228~1.EXE File opened for modification C:\Windows\directx.sys 36E228~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.com36E228~1.EXEsvchost.com36E228~1.EXE36E228~1.EXEsvchost.comsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXEsvchost.comsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXE36E228~1.EXE36E228~1.EXEsvchost.comsvchost.comsvchost.com36E228~1.EXEsvchost.comsvchost.com36E228~1.EXE36E228~1.EXE36E228~1.EXEsvchost.com36E228~1.EXE36E228~1.EXE36E228~1.EXEsvchost.comsvchost.com36E228~1.EXEsvchost.com36E228~1.EXE36E228~1.EXEsvchost.comsvchost.com36E228~1.EXEsvchost.com36E228~1.EXE36E228~1.EXEsvchost.com36E228~1.EXE36E228~1.EXEsvchost.comsvchost.com36E228~1.EXE36E228~1.EXEsvchost.comdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36E228~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
Processes:
36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXE36E228~1.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 36E228~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exesvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEsvchost.com36E228~1.EXEdescription pid Process procid_target PID 956 wrote to memory of 2824 956 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe 84 PID 956 wrote to memory of 2824 956 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe 84 PID 956 wrote to memory of 2824 956 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe 84 PID 2824 wrote to memory of 2284 2824 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe 86 PID 2824 wrote to memory of 2284 2824 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe 86 PID 2824 wrote to memory of 2284 2824 36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe 86 PID 2284 wrote to memory of 1744 2284 svchost.com 87 PID 2284 wrote to memory of 1744 2284 svchost.com 87 PID 2284 wrote to memory of 1744 2284 svchost.com 87 PID 1744 wrote to memory of 3712 1744 36E228~1.EXE 88 PID 1744 wrote to memory of 3712 1744 36E228~1.EXE 88 PID 1744 wrote to memory of 3712 1744 36E228~1.EXE 88 PID 3712 wrote to memory of 1852 3712 svchost.com 89 PID 3712 wrote to memory of 1852 3712 svchost.com 89 PID 3712 wrote to memory of 1852 3712 svchost.com 89 PID 1852 wrote to memory of 4724 1852 36E228~1.EXE 90 PID 1852 wrote to memory of 4724 1852 36E228~1.EXE 90 PID 1852 wrote to memory of 4724 1852 36E228~1.EXE 90 PID 4724 wrote to memory of 4124 4724 svchost.com 91 PID 4724 wrote to memory of 4124 4724 svchost.com 91 PID 4724 wrote to memory of 4124 4724 svchost.com 91 PID 4124 wrote to memory of 2264 4124 36E228~1.EXE 92 PID 4124 wrote to memory of 2264 4124 36E228~1.EXE 92 PID 4124 wrote to memory of 2264 4124 36E228~1.EXE 92 PID 2264 wrote to memory of 3544 2264 svchost.com 93 PID 2264 wrote to memory of 3544 2264 svchost.com 93 PID 2264 wrote to memory of 3544 2264 svchost.com 93 PID 3544 wrote to memory of 2640 3544 36E228~1.EXE 94 PID 3544 wrote to memory of 2640 3544 36E228~1.EXE 94 PID 3544 wrote to memory of 2640 3544 36E228~1.EXE 94 PID 2640 wrote to memory of 2876 2640 svchost.com 95 PID 2640 wrote to memory of 2876 2640 svchost.com 95 PID 2640 wrote to memory of 2876 2640 svchost.com 95 PID 2876 wrote to memory of 4784 2876 36E228~1.EXE 96 PID 2876 wrote to memory of 4784 2876 36E228~1.EXE 96 PID 2876 wrote to memory of 4784 2876 36E228~1.EXE 96 PID 4784 wrote to memory of 688 4784 svchost.com 97 PID 4784 wrote to memory of 688 4784 svchost.com 97 PID 4784 wrote to memory of 688 4784 svchost.com 97 PID 688 wrote to memory of 3940 688 36E228~1.EXE 98 PID 688 wrote to memory of 3940 688 36E228~1.EXE 98 PID 688 wrote to memory of 3940 688 36E228~1.EXE 98 PID 3940 wrote to memory of 4484 3940 svchost.com 99 PID 3940 wrote to memory of 4484 3940 svchost.com 99 PID 3940 wrote to memory of 4484 3940 svchost.com 99 PID 4484 wrote to memory of 2400 4484 36E228~1.EXE 127 PID 4484 wrote to memory of 2400 4484 36E228~1.EXE 127 PID 4484 wrote to memory of 2400 4484 36E228~1.EXE 127 PID 2400 wrote to memory of 4036 2400 svchost.com 101 PID 2400 wrote to memory of 4036 2400 svchost.com 101 PID 2400 wrote to memory of 4036 2400 svchost.com 101 PID 4036 wrote to memory of 4208 4036 36E228~1.EXE 267 PID 4036 wrote to memory of 4208 4036 36E228~1.EXE 267 PID 4036 wrote to memory of 4208 4036 36E228~1.EXE 267 PID 4208 wrote to memory of 4396 4208 svchost.com 103 PID 4208 wrote to memory of 4396 4208 svchost.com 103 PID 4208 wrote to memory of 4396 4208 svchost.com 103 PID 4396 wrote to memory of 4212 4396 36E228~1.EXE 104 PID 4396 wrote to memory of 4212 4396 36E228~1.EXE 104 PID 4396 wrote to memory of 4212 4396 36E228~1.EXE 104 PID 4212 wrote to memory of 4604 4212 svchost.com 105 PID 4212 wrote to memory of 4604 4212 svchost.com 105 PID 4212 wrote to memory of 4604 4212 svchost.com 105 PID 4604 wrote to memory of 4744 4604 36E228~1.EXE 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe"C:\Users\Admin\AppData\Local\Temp\36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\36e228fa030534a282bb339a538b76d578cd8ac18a2ec90271ac391e6593c02c.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"23⤵
- Executes dropped EXE
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE24⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"25⤵
- Executes dropped EXE
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE26⤵
- Executes dropped EXE
PID:1920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"27⤵
- Executes dropped EXE
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE28⤵
- Executes dropped EXE
- Modifies registry class
PID:692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"29⤵
- Executes dropped EXE
PID:3652 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE30⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE32⤵
- Executes dropped EXE
PID:4128 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"33⤵
- Executes dropped EXE
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE34⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"35⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE36⤵
- Executes dropped EXE
PID:3588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"37⤵
- Executes dropped EXE
PID:892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"39⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4008 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"41⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"43⤵
- Executes dropped EXE
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"45⤵
- Executes dropped EXE
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"47⤵
- Executes dropped EXE
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"49⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
PID:2188 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE52⤵
- Executes dropped EXE
PID:1148 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"53⤵
- Executes dropped EXE
PID:644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE54⤵
- Executes dropped EXE
- Modifies registry class
PID:2164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"55⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
PID:4624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"57⤵
- Executes dropped EXE
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE58⤵
- Executes dropped EXE
PID:4476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"59⤵
- Executes dropped EXE
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
PID:2292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"61⤵
- Executes dropped EXE
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE62⤵
- Executes dropped EXE
PID:2516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"63⤵
- Executes dropped EXE
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"65⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE66⤵
- Checks computer location settings
PID:2484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"67⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE68⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"69⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE70⤵
- Modifies registry class
PID:5000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"71⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE72⤵
- Checks computer location settings
PID:2716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"73⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE74⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"75⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE76⤵
- Modifies registry class
PID:1452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"77⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE78⤵
- Checks computer location settings
- Modifies registry class
PID:668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"79⤵
- Drops file in Windows directory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE80⤵
- Modifies registry class
PID:2308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"81⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE82⤵PID:2644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"83⤵PID:5076
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE84⤵PID:2768
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"85⤵
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE86⤵
- Checks computer location settings
- Modifies registry class
PID:4324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"87⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE88⤵
- Drops file in Windows directory
PID:208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"89⤵
- System Location Discovery: System Language Discovery
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE90⤵
- Checks computer location settings
PID:800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"91⤵PID:5052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE92⤵
- Drops file in Windows directory
- Modifies registry class
PID:3468 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"93⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE94⤵PID:2408
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"95⤵
- Drops file in Windows directory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE96⤵
- System Location Discovery: System Language Discovery
PID:3988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"97⤵
- Drops file in Windows directory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE98⤵PID:5000
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"99⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE100⤵
- Drops file in Windows directory
- Modifies registry class
PID:2712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"101⤵
- System Location Discovery: System Language Discovery
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE102⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"103⤵PID:4980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE104⤵
- Modifies registry class
PID:772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"105⤵
- Drops file in Windows directory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE106⤵
- Modifies registry class
PID:3932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"107⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE108⤵PID:1148
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"109⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE110⤵
- Checks computer location settings
PID:4580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"111⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE112⤵
- Checks computer location settings
PID:1744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"113⤵PID:1852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE114⤵PID:4940
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"115⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE116⤵
- Checks computer location settings
PID:1656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"117⤵
- Drops file in Windows directory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE118⤵
- Checks computer location settings
- Drops file in Windows directory
PID:800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"119⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE120⤵
- Modifies registry class
PID:3488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE"121⤵PID:3252
-
C:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\36E228~1.EXE122⤵PID:3256
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-