Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
115s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03/11/2024, 12:20
Behavioral task
behavioral1
Sample
9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe
Resource
win10v2004-20241007-en
General
-
Target
9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe
-
Size
1.0MB
-
MD5
fc891c1eef8dc297fb88b558218b9700
-
SHA1
15c7f4ce688c9b64f562dd6707de529820f680ad
-
SHA256
9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451
-
SHA512
7880fff1dffacc597d92bc2be17de557fdc7bde0249b048dc227369ea712021de36ae2ab9772be7108726fcd943067a9127750b770ea857da8fda182dd9b554f
-
SSDEEP
24576:LSEN3xtvIjdFpRXF4R6G1Rxb1L1bxLT1Gxb1715xnlGf6fNfl1gvklTY:LNC9Y
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000c000000023b85-4.dat family_neshta behavioral2/files/0x0008000000023b9f-10.dat family_neshta behavioral2/memory/3024-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4288-26-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/716-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3540-38-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1948-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2188-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5068-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4720-63-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2708-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3968-75-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3676-78-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020216-81.dat family_neshta behavioral2/files/0x00010000000202a7-105.dat family_neshta behavioral2/files/0x0004000000020348-106.dat family_neshta behavioral2/files/0x000600000002022d-122.dat family_neshta behavioral2/files/0x0004000000020309-121.dat family_neshta behavioral2/memory/1620-107-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2776-123-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020336-104.dat family_neshta behavioral2/files/0x0001000000020294-103.dat family_neshta behavioral2/memory/2248-98-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1176-124-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4036-135-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3628-136-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000200000002030d-152.dat family_neshta behavioral2/memory/1180-142-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214d9-157.dat family_neshta behavioral2/files/0x00010000000214d8-156.dat family_neshta behavioral2/files/0x0001000000022f2c-174.dat family_neshta behavioral2/files/0x0001000000022f2f-172.dat family_neshta behavioral2/files/0x0001000000022f6b-177.dat family_neshta behavioral2/memory/3600-178-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/632-189-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000100000001dbde-211.dat family_neshta behavioral2/files/0x000100000001dbd1-210.dat family_neshta behavioral2/files/0x00010000000167c2-209.dat family_neshta behavioral2/files/0x00010000000167e9-202.dat family_neshta behavioral2/memory/4772-224-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4492-233-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1412-235-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1476-243-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3076-257-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3532-266-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2896-267-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3308-274-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3128-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4668-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4684-286-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3132-293-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1108-294-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/856-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3448-302-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2024-309-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4896-310-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1952-317-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4548-318-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3752-320-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1044-326-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3784-328-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/852-334-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3628-336-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/800-342-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 2144 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe 3024 svchost.com 4288 9D2E93~1.EXE 716 svchost.com 3540 9D2E93~1.EXE 1948 svchost.com 2188 9D2E93~1.EXE 5068 svchost.com 4720 9D2E93~1.EXE 2708 svchost.com 3968 9D2E93~1.EXE 3676 svchost.com 2248 9D2E93~1.EXE 1620 svchost.com 2776 9D2E93~1.EXE 1176 svchost.com 4036 9D2E93~1.EXE 3628 svchost.com 1180 9D2E93~1.EXE 3600 svchost.com 632 9D2E93~1.EXE 4772 svchost.com 4492 9D2E93~1.EXE 1412 svchost.com 1476 9D2E93~1.EXE 3076 svchost.com 3532 9D2E93~1.EXE 2896 svchost.com 3308 9D2E93~1.EXE 3128 svchost.com 4668 9D2E93~1.EXE 4684 svchost.com 3132 9D2E93~1.EXE 1108 svchost.com 856 9D2E93~1.EXE 3448 svchost.com 2024 9D2E93~1.EXE 4896 svchost.com 1952 9D2E93~1.EXE 4548 svchost.com 3752 9D2E93~1.EXE 1044 svchost.com 3784 9D2E93~1.EXE 852 svchost.com 3628 9D2E93~1.EXE 800 svchost.com 1984 9D2E93~1.EXE 3928 svchost.com 2236 9D2E93~1.EXE 3956 svchost.com 2604 9D2E93~1.EXE 3552 svchost.com 3896 9D2E93~1.EXE 2460 svchost.com 4592 9D2E93~1.EXE 4572 svchost.com 464 9D2E93~1.EXE 2184 svchost.com 2276 9D2E93~1.EXE 3260 svchost.com 3296 9D2E93~1.EXE 216 svchost.com 752 9D2E93~1.EXE 2768 svchost.com -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9D2E93~1.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 9D2E93~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 9D2E93~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 9D2E93~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 9D2E93~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 9D2E93~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 9D2E93~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 9D2E93~1.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 9D2E93~1.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 9D2E93~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaws.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 9D2E93~1.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4776 9D2E93~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1280 wrote to memory of 2144 1280 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe 84 PID 1280 wrote to memory of 2144 1280 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe 84 PID 1280 wrote to memory of 2144 1280 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe 84 PID 2144 wrote to memory of 3024 2144 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe 85 PID 2144 wrote to memory of 3024 2144 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe 85 PID 2144 wrote to memory of 3024 2144 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe 85 PID 3024 wrote to memory of 4288 3024 svchost.com 86 PID 3024 wrote to memory of 4288 3024 svchost.com 86 PID 3024 wrote to memory of 4288 3024 svchost.com 86 PID 4288 wrote to memory of 716 4288 9D2E93~1.EXE 87 PID 4288 wrote to memory of 716 4288 9D2E93~1.EXE 87 PID 4288 wrote to memory of 716 4288 9D2E93~1.EXE 87 PID 716 wrote to memory of 3540 716 svchost.com 88 PID 716 wrote to memory of 3540 716 svchost.com 88 PID 716 wrote to memory of 3540 716 svchost.com 88 PID 3540 wrote to memory of 1948 3540 9D2E93~1.EXE 89 PID 3540 wrote to memory of 1948 3540 9D2E93~1.EXE 89 PID 3540 wrote to memory of 1948 3540 9D2E93~1.EXE 89 PID 1948 wrote to memory of 2188 1948 svchost.com 90 PID 1948 wrote to memory of 2188 1948 svchost.com 90 PID 1948 wrote to memory of 2188 1948 svchost.com 90 PID 2188 wrote to memory of 5068 2188 9D2E93~1.EXE 91 PID 2188 wrote to memory of 5068 2188 9D2E93~1.EXE 91 PID 2188 wrote to memory of 5068 2188 9D2E93~1.EXE 91 PID 5068 wrote to memory of 4720 5068 svchost.com 92 PID 5068 wrote to memory of 4720 5068 svchost.com 92 PID 5068 wrote to memory of 4720 5068 svchost.com 92 PID 4720 wrote to memory of 2708 4720 9D2E93~1.EXE 93 PID 4720 wrote to memory of 2708 4720 9D2E93~1.EXE 93 PID 4720 wrote to memory of 2708 4720 9D2E93~1.EXE 93 PID 2708 wrote to memory of 3968 2708 svchost.com 94 PID 2708 wrote to memory of 3968 2708 svchost.com 94 PID 2708 wrote to memory of 3968 2708 svchost.com 94 PID 3968 wrote to memory of 3676 3968 9D2E93~1.EXE 95 PID 3968 wrote to memory of 3676 3968 9D2E93~1.EXE 95 PID 3968 wrote to memory of 3676 3968 9D2E93~1.EXE 95 PID 3676 wrote to memory of 2248 3676 svchost.com 158 PID 3676 wrote to memory of 2248 3676 svchost.com 158 PID 3676 wrote to memory of 2248 3676 svchost.com 158 PID 2248 wrote to memory of 1620 2248 9D2E93~1.EXE 97 PID 2248 wrote to memory of 1620 2248 9D2E93~1.EXE 97 PID 2248 wrote to memory of 1620 2248 9D2E93~1.EXE 97 PID 1620 wrote to memory of 2776 1620 svchost.com 98 PID 1620 wrote to memory of 2776 1620 svchost.com 98 PID 1620 wrote to memory of 2776 1620 svchost.com 98 PID 2776 wrote to memory of 1176 2776 9D2E93~1.EXE 99 PID 2776 wrote to memory of 1176 2776 9D2E93~1.EXE 99 PID 2776 wrote to memory of 1176 2776 9D2E93~1.EXE 99 PID 1176 wrote to memory of 4036 1176 svchost.com 193 PID 1176 wrote to memory of 4036 1176 svchost.com 193 PID 1176 wrote to memory of 4036 1176 svchost.com 193 PID 4036 wrote to memory of 3628 4036 9D2E93~1.EXE 129 PID 4036 wrote to memory of 3628 4036 9D2E93~1.EXE 129 PID 4036 wrote to memory of 3628 4036 9D2E93~1.EXE 129 PID 3628 wrote to memory of 1180 3628 svchost.com 102 PID 3628 wrote to memory of 1180 3628 svchost.com 102 PID 3628 wrote to memory of 1180 3628 svchost.com 102 PID 1180 wrote to memory of 3600 1180 9D2E93~1.EXE 104 PID 1180 wrote to memory of 3600 1180 9D2E93~1.EXE 104 PID 1180 wrote to memory of 3600 1180 9D2E93~1.EXE 104 PID 3600 wrote to memory of 632 3600 svchost.com 105 PID 3600 wrote to memory of 632 3600 svchost.com 105 PID 3600 wrote to memory of 632 3600 svchost.com 105 PID 632 wrote to memory of 4772 632 9D2E93~1.EXE 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe"C:\Users\Admin\AppData\Local\Temp\9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"23⤵
- Executes dropped EXE
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
PID:4492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE26⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"27⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3532 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"29⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
PID:3308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"31⤵
- Executes dropped EXE
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
PID:4668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"33⤵
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE34⤵
- Executes dropped EXE
- Modifies registry class
PID:3132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"35⤵
- Executes dropped EXE
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE36⤵
- Executes dropped EXE
- Modifies registry class
PID:856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"37⤵
- Executes dropped EXE
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"39⤵
- Executes dropped EXE
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
PID:1952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"41⤵
- Executes dropped EXE
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"43⤵
- Executes dropped EXE
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3784 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"45⤵
- Executes dropped EXE
PID:852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3628 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"49⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"51⤵
- Executes dropped EXE
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE52⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
PID:3896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"55⤵
- Executes dropped EXE
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
PID:4592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"57⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"59⤵
- Executes dropped EXE
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
PID:2276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"61⤵
- Executes dropped EXE
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE62⤵
- Executes dropped EXE
- Modifies registry class
PID:3296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:216 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"65⤵
- Executes dropped EXE
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE66⤵
- Drops file in Windows directory
PID:1700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE68⤵
- Checks computer location settings
PID:1636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"69⤵PID:4256
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE70⤵
- Checks computer location settings
PID:3760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"71⤵
- Drops file in Windows directory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE72⤵PID:2248
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"73⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE74⤵
- Drops file in Windows directory
PID:1812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"75⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE76⤵
- Modifies registry class
PID:4964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"77⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE78⤵
- Modifies registry class
PID:3548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"79⤵PID:3800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE80⤵PID:5096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"81⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE82⤵
- Checks computer location settings
PID:3552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"83⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE84⤵
- Modifies registry class
PID:4280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"85⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE86⤵
- Drops file in Windows directory
- Modifies registry class
PID:3252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"87⤵
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE88⤵
- Drops file in Windows directory
PID:4976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"89⤵
- System Location Discovery: System Language Discovery
PID:3328 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE90⤵
- Checks computer location settings
PID:216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"91⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE92⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"93⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE94⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:4220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"95⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE96⤵PID:4296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"97⤵PID:3544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE98⤵PID:844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE100⤵PID:2628
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"101⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE102⤵PID:3124
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"103⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE104⤵PID:2064
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"105⤵PID:1336
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE106⤵
- Checks computer location settings
- Modifies registry class
PID:5092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"107⤵PID:800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE108⤵PID:2104
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"109⤵
- Drops file in Windows directory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE110⤵
- System Location Discovery: System Language Discovery
PID:1984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"111⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE112⤵PID:1420
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"113⤵PID:4028
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE114⤵PID:1500
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"115⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE116⤵
- Checks computer location settings
PID:4104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"117⤵
- Drops file in Windows directory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE118⤵
- Checks computer location settings
PID:396 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"119⤵
- Drops file in Windows directory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE120⤵PID:3076
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"121⤵
- System Location Discovery: System Language Discovery
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE122⤵PID:3128
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-