Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2024 12:30
Behavioral task
behavioral1
Sample
9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe
Resource
win10v2004-20241007-en
General
-
Target
9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe
-
Size
1.0MB
-
MD5
fc891c1eef8dc297fb88b558218b9700
-
SHA1
15c7f4ce688c9b64f562dd6707de529820f680ad
-
SHA256
9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451
-
SHA512
7880fff1dffacc597d92bc2be17de557fdc7bde0249b048dc227369ea712021de36ae2ab9772be7108726fcd943067a9127750b770ea857da8fda182dd9b554f
-
SSDEEP
24576:LSEN3xtvIjdFpRXF4R6G1Rxb1L1bxLT1Gxb1715xnlGf6fNfl1gvklTY:LNC9Y
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0007000000023c89-4.dat family_neshta behavioral2/files/0x0007000000023c8a-10.dat family_neshta behavioral2/memory/2520-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3036-26-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1352-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3244-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1820-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4912-50-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4792-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2824-63-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3124-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4708-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2920-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020343-78.dat family_neshta behavioral2/memory/4192-92-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000700000002027e-84.dat family_neshta behavioral2/files/0x0004000000020335-98.dat family_neshta behavioral2/files/0x0004000000020336-103.dat family_neshta behavioral2/files/0x0004000000020348-106.dat family_neshta behavioral2/files/0x0001000000020294-102.dat family_neshta behavioral2/memory/3816-120-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4808-110-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000200000002030d-137.dat family_neshta behavioral2/files/0x00010000000214d8-144.dat family_neshta behavioral2/files/0x00010000000214da-152.dat family_neshta behavioral2/files/0x00010000000214d9-150.dat family_neshta behavioral2/files/0x00010000000225d6-143.dat family_neshta behavioral2/files/0x0001000000021533-140.dat family_neshta behavioral2/files/0x0001000000022f67-166.dat family_neshta behavioral2/files/0x000100000001680d-180.dat family_neshta behavioral2/files/0x00010000000167ef-186.dat family_neshta behavioral2/files/0x00010000000167f0-185.dat family_neshta behavioral2/files/0x00010000000167d3-179.dat family_neshta behavioral2/files/0x000100000001685d-178.dat family_neshta behavioral2/files/0x00010000000167cf-177.dat family_neshta behavioral2/files/0x00010000000167d1-176.dat family_neshta behavioral2/files/0x00010000000167b6-174.dat family_neshta behavioral2/files/0x0001000000016808-173.dat family_neshta behavioral2/files/0x0001000000022f69-165.dat family_neshta behavioral2/files/0x0001000000022f28-164.dat family_neshta behavioral2/files/0x0001000000022f2b-163.dat family_neshta behavioral2/memory/1020-145-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/400-217-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0008000000020237-136.dat family_neshta behavioral2/files/0x0006000000020235-135.dat family_neshta behavioral2/memory/4292-122-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3108-226-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4572-230-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2884-232-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1380-238-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4880-240-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1352-246-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2264-253-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3564-254-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3164-261-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/552-262-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/228-264-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2952-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3572-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4720-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4508-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1408-286-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1844-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2892-294-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 9D2E93~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 2560 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe 2520 svchost.com 3036 9D2E93~1.EXE 1352 svchost.com 3244 9D2E93~1.EXE 1820 svchost.com 4912 9D2E93~1.EXE 4792 svchost.com 2824 9D2E93~1.EXE 3124 svchost.com 4708 9D2E93~1.EXE 2920 svchost.com 4192 9D2E93~1.EXE 4808 svchost.com 3816 9D2E93~1.EXE 4292 svchost.com 1020 9D2E93~1.EXE 400 svchost.com 3108 9D2E93~1.EXE 4572 svchost.com 2884 9D2E93~1.EXE 1380 svchost.com 4880 9D2E93~1.EXE 1352 svchost.com 2264 9D2E93~1.EXE 3564 svchost.com 3164 9D2E93~1.EXE 552 svchost.com 228 9D2E93~1.EXE 2952 svchost.com 3572 9D2E93~1.EXE 4720 svchost.com 4508 9D2E93~1.EXE 1408 svchost.com 1844 9D2E93~1.EXE 2892 svchost.com 2164 9D2E93~1.EXE 4300 svchost.com 4060 9D2E93~1.EXE 376 svchost.com 364 9D2E93~1.EXE 932 svchost.com 2036 9D2E93~1.EXE 2568 svchost.com 1316 9D2E93~1.EXE 2152 svchost.com 4228 9D2E93~1.EXE 4884 svchost.com 3848 9D2E93~1.EXE 2944 svchost.com 4860 9D2E93~1.EXE 3108 svchost.com 4216 9D2E93~1.EXE 452 svchost.com 4028 9D2E93~1.EXE 4224 svchost.com 1864 9D2E93~1.EXE 1188 svchost.com 2924 9D2E93~1.EXE 2692 svchost.com 2888 9D2E93~1.EXE 1848 svchost.com 1480 9D2E93~1.EXE 4992 svchost.com -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9D2E93~1.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 9D2E93~1.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 9D2E93~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 9D2E93~1.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 9D2E93~1.EXE -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE File opened for modification C:\Windows\directx.sys 9D2E93~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 9D2E93~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D2E93~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 9D2E93~1.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4936 9D2E93~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5092 wrote to memory of 2560 5092 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe 85 PID 5092 wrote to memory of 2560 5092 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe 85 PID 5092 wrote to memory of 2560 5092 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe 85 PID 2560 wrote to memory of 2520 2560 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe 86 PID 2560 wrote to memory of 2520 2560 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe 86 PID 2560 wrote to memory of 2520 2560 9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe 86 PID 2520 wrote to memory of 3036 2520 svchost.com 87 PID 2520 wrote to memory of 3036 2520 svchost.com 87 PID 2520 wrote to memory of 3036 2520 svchost.com 87 PID 3036 wrote to memory of 1352 3036 9D2E93~1.EXE 88 PID 3036 wrote to memory of 1352 3036 9D2E93~1.EXE 88 PID 3036 wrote to memory of 1352 3036 9D2E93~1.EXE 88 PID 1352 wrote to memory of 3244 1352 svchost.com 89 PID 1352 wrote to memory of 3244 1352 svchost.com 89 PID 1352 wrote to memory of 3244 1352 svchost.com 89 PID 3244 wrote to memory of 1820 3244 9D2E93~1.EXE 90 PID 3244 wrote to memory of 1820 3244 9D2E93~1.EXE 90 PID 3244 wrote to memory of 1820 3244 9D2E93~1.EXE 90 PID 1820 wrote to memory of 4912 1820 svchost.com 91 PID 1820 wrote to memory of 4912 1820 svchost.com 91 PID 1820 wrote to memory of 4912 1820 svchost.com 91 PID 4912 wrote to memory of 4792 4912 9D2E93~1.EXE 92 PID 4912 wrote to memory of 4792 4912 9D2E93~1.EXE 92 PID 4912 wrote to memory of 4792 4912 9D2E93~1.EXE 92 PID 4792 wrote to memory of 2824 4792 svchost.com 93 PID 4792 wrote to memory of 2824 4792 svchost.com 93 PID 4792 wrote to memory of 2824 4792 svchost.com 93 PID 2824 wrote to memory of 3124 2824 9D2E93~1.EXE 94 PID 2824 wrote to memory of 3124 2824 9D2E93~1.EXE 94 PID 2824 wrote to memory of 3124 2824 9D2E93~1.EXE 94 PID 3124 wrote to memory of 4708 3124 svchost.com 95 PID 3124 wrote to memory of 4708 3124 svchost.com 95 PID 3124 wrote to memory of 4708 3124 svchost.com 95 PID 4708 wrote to memory of 2920 4708 9D2E93~1.EXE 97 PID 4708 wrote to memory of 2920 4708 9D2E93~1.EXE 97 PID 4708 wrote to memory of 2920 4708 9D2E93~1.EXE 97 PID 2920 wrote to memory of 4192 2920 svchost.com 98 PID 2920 wrote to memory of 4192 2920 svchost.com 98 PID 2920 wrote to memory of 4192 2920 svchost.com 98 PID 4192 wrote to memory of 4808 4192 9D2E93~1.EXE 99 PID 4192 wrote to memory of 4808 4192 9D2E93~1.EXE 99 PID 4192 wrote to memory of 4808 4192 9D2E93~1.EXE 99 PID 4808 wrote to memory of 3816 4808 svchost.com 185 PID 4808 wrote to memory of 3816 4808 svchost.com 185 PID 4808 wrote to memory of 3816 4808 svchost.com 185 PID 3816 wrote to memory of 4292 3816 9D2E93~1.EXE 101 PID 3816 wrote to memory of 4292 3816 9D2E93~1.EXE 101 PID 3816 wrote to memory of 4292 3816 9D2E93~1.EXE 101 PID 4292 wrote to memory of 1020 4292 svchost.com 102 PID 4292 wrote to memory of 1020 4292 svchost.com 102 PID 4292 wrote to memory of 1020 4292 svchost.com 102 PID 1020 wrote to memory of 400 1020 9D2E93~1.EXE 103 PID 1020 wrote to memory of 400 1020 9D2E93~1.EXE 103 PID 1020 wrote to memory of 400 1020 9D2E93~1.EXE 103 PID 400 wrote to memory of 3108 400 svchost.com 138 PID 400 wrote to memory of 3108 400 svchost.com 138 PID 400 wrote to memory of 3108 400 svchost.com 138 PID 3108 wrote to memory of 4572 3108 9D2E93~1.EXE 105 PID 3108 wrote to memory of 4572 3108 9D2E93~1.EXE 105 PID 3108 wrote to memory of 4572 3108 9D2E93~1.EXE 105 PID 4572 wrote to memory of 2884 4572 svchost.com 106 PID 4572 wrote to memory of 2884 4572 svchost.com 106 PID 4572 wrote to memory of 2884 4572 svchost.com 106 PID 2884 wrote to memory of 1380 2884 9D2E93~1.EXE 276
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe"C:\Users\Admin\AppData\Local\Temp\9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\9d2e93e3bca581bdb45c0ced62c02d26d3c8d4590ffac9a1d38c295780293451N.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE24⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"25⤵
- Executes dropped EXE
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE26⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"27⤵
- Executes dropped EXE
PID:3564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
PID:3164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"29⤵
- Executes dropped EXE
PID:552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"31⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"33⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
PID:4508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"35⤵
- Executes dropped EXE
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE38⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
PID:4060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"41⤵
- Executes dropped EXE
PID:376 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE42⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"43⤵
- Executes dropped EXE
PID:932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"45⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE46⤵
- Executes dropped EXE
PID:1316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE48⤵
- Executes dropped EXE
PID:4228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"49⤵
- Executes dropped EXE
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"51⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
PID:4860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"53⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE54⤵
- Executes dropped EXE
PID:4216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"55⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"57⤵
- Executes dropped EXE
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE58⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"59⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
PID:2924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"61⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE62⤵
- Executes dropped EXE
- Modifies registry class
PID:2888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE64⤵
- Executes dropped EXE
- Modifies registry class
PID:1480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"65⤵
- Executes dropped EXE
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE66⤵
- Drops file in Windows directory
- Modifies registry class
PID:4064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"67⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE68⤵
- Modifies registry class
PID:1844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"69⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE70⤵
- Checks computer location settings
- Drops file in Windows directory
PID:1924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"71⤵PID:3756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE72⤵
- Checks computer location settings
PID:1568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"73⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE74⤵PID:3204
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE76⤵
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"77⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE78⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"79⤵
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE80⤵
- Modifies registry class
PID:4332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"81⤵
- Drops file in Windows directory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE82⤵
- System Location Discovery: System Language Discovery
PID:756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"83⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE84⤵
- Checks computer location settings
PID:4864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"85⤵
- Drops file in Windows directory
PID:5028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE86⤵PID:4676
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"87⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE88⤵
- Modifies registry class
PID:3040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"89⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE90⤵
- Checks computer location settings
PID:4708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"91⤵
- Drops file in Windows directory
PID:460 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE92⤵
- Checks computer location settings
- Modifies registry class
PID:1640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"93⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE94⤵
- Modifies registry class
PID:4280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"95⤵
- System Location Discovery: System Language Discovery
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE96⤵
- Drops file in Windows directory
PID:3816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"97⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE98⤵
- System Location Discovery: System Language Discovery
PID:5000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"99⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE100⤵
- Modifies registry class
PID:2364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"101⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE102⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"103⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE104⤵PID:1308
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"105⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE106⤵
- Modifies registry class
PID:5116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"107⤵PID:4044
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE108⤵
- Checks computer location settings
PID:2152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"109⤵PID:4944
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE110⤵
- Modifies registry class
PID:4316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"111⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE112⤵PID:636
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"113⤵PID:4172
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE114⤵
- Drops file in Windows directory
PID:1400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"115⤵
- System Location Discovery: System Language Discovery
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE116⤵
- Checks computer location settings
- Modifies registry class
PID:1380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"117⤵
- Drops file in Windows directory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE118⤵PID:4164
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"119⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE120⤵
- Checks computer location settings
- Modifies registry class
PID:2044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE"121⤵
- Drops file in Windows directory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D2E93~1.EXE122⤵
- Drops file in Windows directory
PID:1416
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-