Analysis
-
max time kernel
124s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2024, 06:41
Behavioral task
behavioral1
Sample
fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe
Resource
win10v2004-20241007-en
General
-
Target
fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe
-
Size
489KB
-
MD5
36699c5e72c615e52a3ccec1d1e34902
-
SHA1
68cfb52b76dcad96c8235b77966699b439fbcd8f
-
SHA256
fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76
-
SHA512
9c7caac8d57bf4eec23e579962bf909a1bd4e1684ff0554273fa0d085584207c70b19db9e07995eac98c105d03d536b2c975166127d2ecdb5ae293c4510f1071
-
SSDEEP
3072:sr85Cp59nwCVssMlaySQp5xqIFvxkuFzCtD5huH5jPWxWiwpup3jSSu5rPOdxWr9:k9NV9y/p58+vxoGH5jaQ5eW9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0007000000023c74-4.dat family_neshta behavioral2/files/0x0007000000023c75-10.dat family_neshta behavioral2/memory/5112-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4832-24-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/552-26-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1272-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2436-38-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3948-49-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4836-50-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4088-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3476-62-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/320-72-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3560-74-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3472-85-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020343-88.dat family_neshta behavioral2/files/0x000600000002021e-94.dat family_neshta behavioral2/files/0x0006000000020216-93.dat family_neshta behavioral2/files/0x0001000000020294-101.dat family_neshta behavioral2/files/0x000600000002022d-112.dat family_neshta behavioral2/files/0x0004000000020309-111.dat family_neshta behavioral2/memory/3716-122-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2792-107-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000700000002027e-92.dat family_neshta behavioral2/memory/5096-124-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3568-134-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/920-136-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4920-151-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214d8-159.dat family_neshta behavioral2/files/0x00010000000214da-161.dat family_neshta behavioral2/files/0x00010000000214d9-160.dat family_neshta behavioral2/files/0x0001000000022f26-166.dat family_neshta behavioral2/files/0x0001000000022f2a-165.dat family_neshta behavioral2/memory/4812-171-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f69-174.dat family_neshta behavioral2/memory/4884-186-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000016808-188.dat family_neshta behavioral2/files/0x00010000000167d3-198.dat family_neshta behavioral2/files/0x000100000001685d-197.dat family_neshta behavioral2/files/0x00010000000167f0-205.dat family_neshta behavioral2/memory/1544-206-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167cb-204.dat family_neshta behavioral2/files/0x000200000001dc0c-210.dat family_neshta behavioral2/files/0x000100000001691f-221.dat family_neshta behavioral2/memory/1812-234-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1400-252-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/936-254-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2568-260-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4864-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2116-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3904-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1288-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1852-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3600-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/452-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3884-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3436-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2860-304-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4604-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2232-312-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2692-314-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3628-320-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1604-322-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4620-328-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4792-335-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation FBE01D~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 4732 fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe 5112 svchost.com 4832 FBE01D~1.EXE 552 svchost.com 1272 FBE01D~1.EXE 2436 svchost.com 3948 FBE01D~1.EXE 4836 svchost.com 4088 FBE01D~1.EXE 3476 svchost.com 320 FBE01D~1.EXE 3560 svchost.com 3472 FBE01D~1.EXE 2792 svchost.com 3716 FBE01D~1.EXE 5096 svchost.com 3568 FBE01D~1.EXE 920 svchost.com 4920 FBE01D~1.EXE 4812 svchost.com 4884 FBE01D~1.EXE 1544 svchost.com 1812 FBE01D~1.EXE 1400 svchost.com 936 FBE01D~1.EXE 2568 svchost.com 4864 FBE01D~1.EXE 2116 svchost.com 3904 FBE01D~1.EXE 1288 svchost.com 1852 FBE01D~1.EXE 3600 svchost.com 452 FBE01D~1.EXE 3884 svchost.com 3436 FBE01D~1.EXE 2860 svchost.com 4604 FBE01D~1.EXE 2232 svchost.com 2692 FBE01D~1.EXE 3628 svchost.com 1604 FBE01D~1.EXE 4620 svchost.com 4792 FBE01D~1.EXE 3100 svchost.com 3008 FBE01D~1.EXE 2416 svchost.com 520 FBE01D~1.EXE 2696 svchost.com 5112 FBE01D~1.EXE 4340 svchost.com 1800 FBE01D~1.EXE 4244 svchost.com 3728 FBE01D~1.EXE 2588 svchost.com 1644 FBE01D~1.EXE 3848 svchost.com 1400 FBE01D~1.EXE 224 svchost.com 2568 FBE01D~1.EXE 1700 svchost.com 1908 FBE01D~1.EXE 1332 svchost.com 4092 FBE01D~1.EXE 3884 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FBE01D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FBE01D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FBE01D~1.EXE File opened for modification C:\Windows\directx.sys FBE01D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FBE01D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FBE01D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FBE01D~1.EXE File opened for modification C:\Windows\directx.sys FBE01D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FBE01D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FBE01D~1.EXE File opened for modification C:\Windows\svchost.com FBE01D~1.EXE File opened for modification C:\Windows\directx.sys FBE01D~1.EXE File opened for modification C:\Windows\directx.sys FBE01D~1.EXE File opened for modification C:\Windows\svchost.com FBE01D~1.EXE File opened for modification C:\Windows\directx.sys FBE01D~1.EXE File opened for modification C:\Windows\svchost.com FBE01D~1.EXE File opened for modification C:\Windows\svchost.com FBE01D~1.EXE File opened for modification C:\Windows\svchost.com FBE01D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FBE01D~1.EXE File opened for modification C:\Windows\svchost.com FBE01D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FBE01D~1.EXE File opened for modification C:\Windows\directx.sys FBE01D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FBE01D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FBE01D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FBE01D~1.EXE File opened for modification C:\Windows\svchost.com FBE01D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FBE01D~1.EXE File opened for modification C:\Windows\svchost.com FBE01D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FBE01D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings FBE01D~1.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2848 FBE01D~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 4732 2144 fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe 84 PID 2144 wrote to memory of 4732 2144 fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe 84 PID 2144 wrote to memory of 4732 2144 fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe 84 PID 4732 wrote to memory of 5112 4732 fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe 85 PID 4732 wrote to memory of 5112 4732 fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe 85 PID 4732 wrote to memory of 5112 4732 fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe 85 PID 5112 wrote to memory of 4832 5112 svchost.com 86 PID 5112 wrote to memory of 4832 5112 svchost.com 86 PID 5112 wrote to memory of 4832 5112 svchost.com 86 PID 4832 wrote to memory of 552 4832 FBE01D~1.EXE 87 PID 4832 wrote to memory of 552 4832 FBE01D~1.EXE 87 PID 4832 wrote to memory of 552 4832 FBE01D~1.EXE 87 PID 552 wrote to memory of 1272 552 svchost.com 88 PID 552 wrote to memory of 1272 552 svchost.com 88 PID 552 wrote to memory of 1272 552 svchost.com 88 PID 1272 wrote to memory of 2436 1272 FBE01D~1.EXE 90 PID 1272 wrote to memory of 2436 1272 FBE01D~1.EXE 90 PID 1272 wrote to memory of 2436 1272 FBE01D~1.EXE 90 PID 2436 wrote to memory of 3948 2436 svchost.com 91 PID 2436 wrote to memory of 3948 2436 svchost.com 91 PID 2436 wrote to memory of 3948 2436 svchost.com 91 PID 3948 wrote to memory of 4836 3948 FBE01D~1.EXE 92 PID 3948 wrote to memory of 4836 3948 FBE01D~1.EXE 92 PID 3948 wrote to memory of 4836 3948 FBE01D~1.EXE 92 PID 4836 wrote to memory of 4088 4836 svchost.com 93 PID 4836 wrote to memory of 4088 4836 svchost.com 93 PID 4836 wrote to memory of 4088 4836 svchost.com 93 PID 4088 wrote to memory of 3476 4088 FBE01D~1.EXE 94 PID 4088 wrote to memory of 3476 4088 FBE01D~1.EXE 94 PID 4088 wrote to memory of 3476 4088 FBE01D~1.EXE 94 PID 3476 wrote to memory of 320 3476 svchost.com 95 PID 3476 wrote to memory of 320 3476 svchost.com 95 PID 3476 wrote to memory of 320 3476 svchost.com 95 PID 320 wrote to memory of 3560 320 FBE01D~1.EXE 96 PID 320 wrote to memory of 3560 320 FBE01D~1.EXE 96 PID 320 wrote to memory of 3560 320 FBE01D~1.EXE 96 PID 3560 wrote to memory of 3472 3560 svchost.com 97 PID 3560 wrote to memory of 3472 3560 svchost.com 97 PID 3560 wrote to memory of 3472 3560 svchost.com 97 PID 3472 wrote to memory of 2792 3472 FBE01D~1.EXE 98 PID 3472 wrote to memory of 2792 3472 FBE01D~1.EXE 98 PID 3472 wrote to memory of 2792 3472 FBE01D~1.EXE 98 PID 2792 wrote to memory of 3716 2792 svchost.com 99 PID 2792 wrote to memory of 3716 2792 svchost.com 99 PID 2792 wrote to memory of 3716 2792 svchost.com 99 PID 3716 wrote to memory of 5096 3716 FBE01D~1.EXE 100 PID 3716 wrote to memory of 5096 3716 FBE01D~1.EXE 100 PID 3716 wrote to memory of 5096 3716 FBE01D~1.EXE 100 PID 5096 wrote to memory of 3568 5096 svchost.com 268 PID 5096 wrote to memory of 3568 5096 svchost.com 268 PID 5096 wrote to memory of 3568 5096 svchost.com 268 PID 3568 wrote to memory of 920 3568 FBE01D~1.EXE 103 PID 3568 wrote to memory of 920 3568 FBE01D~1.EXE 103 PID 3568 wrote to memory of 920 3568 FBE01D~1.EXE 103 PID 920 wrote to memory of 4920 920 svchost.com 104 PID 920 wrote to memory of 4920 920 svchost.com 104 PID 920 wrote to memory of 4920 920 svchost.com 104 PID 4920 wrote to memory of 4812 4920 FBE01D~1.EXE 105 PID 4920 wrote to memory of 4812 4920 FBE01D~1.EXE 105 PID 4920 wrote to memory of 4812 4920 FBE01D~1.EXE 105 PID 4812 wrote to memory of 4884 4812 svchost.com 269 PID 4812 wrote to memory of 4884 4812 svchost.com 269 PID 4812 wrote to memory of 4884 4812 svchost.com 269 PID 4884 wrote to memory of 1544 4884 FBE01D~1.EXE 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe"C:\Users\Admin\AppData\Local\Temp\fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\3582-490\fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\fbe01d8c4ecd4f2d12ef72a18dfb45a7d09ea47561ca943afbbf5adc07085d76.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"23⤵
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"25⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"27⤵
- Executes dropped EXE
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE28⤵
- Executes dropped EXE
- Modifies registry class
PID:4864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE30⤵
- Executes dropped EXE
PID:3904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE32⤵
- Executes dropped EXE
PID:1852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE34⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE36⤵
- Executes dropped EXE
PID:3436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE38⤵
- Executes dropped EXE
PID:4604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"39⤵
- Executes dropped EXE
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE40⤵
- Executes dropped EXE
- Modifies registry class
PID:2692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"41⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE42⤵
- Executes dropped EXE
PID:1604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"43⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE44⤵
- Executes dropped EXE
PID:4792 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"45⤵
- Executes dropped EXE
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3008 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"47⤵
- Executes dropped EXE
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE48⤵
- Executes dropped EXE
PID:520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"49⤵
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"51⤵
- Executes dropped EXE
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE52⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"53⤵
- Executes dropped EXE
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE54⤵
- Executes dropped EXE
PID:3728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"55⤵
- Executes dropped EXE
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"57⤵
- Executes dropped EXE
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE58⤵
- Executes dropped EXE
PID:1400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"59⤵
- Executes dropped EXE
PID:224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE60⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE62⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"63⤵
- Executes dropped EXE
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"65⤵
- Executes dropped EXE
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE66⤵
- Checks computer location settings
PID:4736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE68⤵PID:944
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"69⤵
- System Location Discovery: System Language Discovery
PID:904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE70⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"71⤵PID:4860
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE72⤵
- Checks computer location settings
PID:3120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"73⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE74⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"75⤵PID:4384
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE76⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE78⤵PID:4404
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"79⤵
- Drops file in Windows directory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE80⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"81⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE82⤵
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"83⤵PID:4468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE84⤵
- Modifies registry class
PID:4036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"85⤵PID:4520
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE86⤵PID:4228
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"87⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE88⤵PID:2596
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"89⤵PID:4512
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE90⤵
- Drops file in Windows directory
PID:4396 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"91⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE92⤵
- Checks computer location settings
- Modifies registry class
PID:4780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"93⤵
- Drops file in Windows directory
PID:3808 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE94⤵PID:4736
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"95⤵PID:2392
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE96⤵
- Checks computer location settings
PID:4080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"97⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE98⤵PID:5084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"99⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE100⤵
- System Location Discovery: System Language Discovery
PID:2576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"101⤵PID:3100
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE102⤵PID:3008
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"103⤵
- Drops file in Windows directory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE104⤵
- Checks computer location settings
PID:4344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"105⤵
- Drops file in Windows directory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE106⤵
- Checks computer location settings
PID:1732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"107⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE108⤵
- Checks computer location settings
- Modifies registry class
PID:2176 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"109⤵
- System Location Discovery: System Language Discovery
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE110⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"111⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE112⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"113⤵PID:3108
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE114⤵
- Checks computer location settings
PID:1920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"115⤵
- Drops file in Windows directory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE116⤵PID:1416
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE118⤵PID:4780
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"119⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE120⤵
- Modifies registry class
PID:904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE"121⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FBE01D~1.EXE122⤵PID:1496
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-