Analysis
-
max time kernel
17s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 00:27
Behavioral task
behavioral1
Sample
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe
Resource
win10v2004-20241007-en
General
-
Target
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe
-
Size
253KB
-
MD5
d54b7905893774b4896e54bf5c75d790
-
SHA1
e074def1b0083e3ee24a264904891540d8101d12
-
SHA256
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a
-
SHA512
8f99bfc222db409553af25bceb1ee3866f5a9dd4fead718b37da636f97c0a045346c4083cce566a8e383f37afa1751506aea8670feeb124e3ee19ef2c96cf96c
-
SSDEEP
3072:sr85CwBxR1qJmcv8fyOolexayyyyjU1eEYr85C:k9wBxRTcv8faIAH9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule behavioral2/files/0x000a000000023b8e-4.dat family_neshta behavioral2/files/0x000a000000023b8f-10.dat family_neshta behavioral2/memory/1084-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4632-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5000-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/688-38-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3064-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4688-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2892-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/448-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1672-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1628-75-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2052-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4448-87-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2372-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/388-98-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1452-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3060-104-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1924-112-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2952-116-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002035f-125.dat family_neshta behavioral2/memory/4052-132-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1300-147-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020325-156.dat family_neshta behavioral2/memory/400-160-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3584-171-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4644-172-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5012-176-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1668-184-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2496-188-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3560-196-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1004-200-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5056-208-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3548-211-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/736-224-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1208-237-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4884-265-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2236-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1348-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/8-292-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1752-302-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4596-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4384-321-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3052-328-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1828-335-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/60-337-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2320-349-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1728-351-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2384-357-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1408-364-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2256-365-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5100-367-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/728-373-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2204-375-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3308-381-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/964-383-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4048-389-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3832-391-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4636-397-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/324-404-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2604-405-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1776-412-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3872-413-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/796-415-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 51 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXEdescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 723254~1.EXE -
Executes dropped EXE 64 IoCs
Processes:
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exesvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.compid Process 1772 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 1084 svchost.com 4632 723254~1.EXE 5000 svchost.com 688 723254~1.EXE 3064 svchost.com 4688 723254~1.EXE 2892 svchost.com 448 723254~1.EXE 1672 svchost.com 1628 723254~1.EXE 2052 svchost.com 4448 723254~1.EXE 2372 svchost.com 388 723254~1.EXE 1452 svchost.com 3060 723254~1.EXE 1924 svchost.com 2952 723254~1.EXE 4052 svchost.com 1300 723254~1.EXE 400 svchost.com 3584 723254~1.EXE 4644 svchost.com 5012 723254~1.EXE 1668 svchost.com 2496 723254~1.EXE 3560 svchost.com 1004 723254~1.EXE 5056 svchost.com 3548 723254~1.EXE 736 svchost.com 1208 723254~1.EXE 4884 svchost.com 2236 723254~1.EXE 1348 svchost.com 8 723254~1.EXE 1752 svchost.com 4596 723254~1.EXE 4384 svchost.com 3052 723254~1.EXE 1828 svchost.com 60 723254~1.EXE 2320 svchost.com 1728 723254~1.EXE 2384 svchost.com 1408 723254~1.EXE 2256 svchost.com 5100 723254~1.EXE 728 svchost.com 2204 723254~1.EXE 3308 svchost.com 964 723254~1.EXE 4048 svchost.com 3832 723254~1.EXE 4636 svchost.com 324 723254~1.EXE 2604 svchost.com 1776 723254~1.EXE 3872 svchost.com 796 723254~1.EXE 4528 svchost.com 3804 723254~1.EXE 576 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exedescription ioc Process File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaws.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.com723254~1.EXEsvchost.com723254~1.EXE723254~1.EXEsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.comsvchost.com723254~1.EXEsvchost.comsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXEsvchost.com723254~1.EXE723254~1.EXEsvchost.com723254~1.EXEsvchost.comsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.comsvchost.com723254~1.EXEsvchost.comsvchost.com723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.com723254~1.EXEsvchost.com723254~1.EXEdescription ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
723254~1.EXEsvchost.comsvchost.comsvchost.com723254~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXE723254~1.EXEsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.com723254~1.EXEsvchost.com723254~1.EXE723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXEsvchost.com723254~1.EXE723254~1.EXEsvchost.com723254~1.EXEsvchost.comsvchost.comsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.comsvchost.com7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exesvchost.comsvchost.comsvchost.com723254~1.EXE723254~1.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE -
Modifies registry class 51 IoCs
Processes:
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXEdescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 723254~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exesvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEdescription pid Process procid_target PID 2520 wrote to memory of 1772 2520 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 84 PID 2520 wrote to memory of 1772 2520 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 84 PID 2520 wrote to memory of 1772 2520 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 84 PID 1772 wrote to memory of 1084 1772 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 85 PID 1772 wrote to memory of 1084 1772 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 85 PID 1772 wrote to memory of 1084 1772 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 85 PID 1084 wrote to memory of 4632 1084 svchost.com 86 PID 1084 wrote to memory of 4632 1084 svchost.com 86 PID 1084 wrote to memory of 4632 1084 svchost.com 86 PID 4632 wrote to memory of 5000 4632 723254~1.EXE 87 PID 4632 wrote to memory of 5000 4632 723254~1.EXE 87 PID 4632 wrote to memory of 5000 4632 723254~1.EXE 87 PID 5000 wrote to memory of 688 5000 svchost.com 88 PID 5000 wrote to memory of 688 5000 svchost.com 88 PID 5000 wrote to memory of 688 5000 svchost.com 88 PID 688 wrote to memory of 3064 688 723254~1.EXE 89 PID 688 wrote to memory of 3064 688 723254~1.EXE 89 PID 688 wrote to memory of 3064 688 723254~1.EXE 89 PID 3064 wrote to memory of 4688 3064 svchost.com 90 PID 3064 wrote to memory of 4688 3064 svchost.com 90 PID 3064 wrote to memory of 4688 3064 svchost.com 90 PID 4688 wrote to memory of 2892 4688 723254~1.EXE 92 PID 4688 wrote to memory of 2892 4688 723254~1.EXE 92 PID 4688 wrote to memory of 2892 4688 723254~1.EXE 92 PID 2892 wrote to memory of 448 2892 svchost.com 93 PID 2892 wrote to memory of 448 2892 svchost.com 93 PID 2892 wrote to memory of 448 2892 svchost.com 93 PID 448 wrote to memory of 1672 448 723254~1.EXE 94 PID 448 wrote to memory of 1672 448 723254~1.EXE 94 PID 448 wrote to memory of 1672 448 723254~1.EXE 94 PID 1672 wrote to memory of 1628 1672 svchost.com 95 PID 1672 wrote to memory of 1628 1672 svchost.com 95 PID 1672 wrote to memory of 1628 1672 svchost.com 95 PID 1628 wrote to memory of 2052 1628 723254~1.EXE 96 PID 1628 wrote to memory of 2052 1628 723254~1.EXE 96 PID 1628 wrote to memory of 2052 1628 723254~1.EXE 96 PID 2052 wrote to memory of 4448 2052 svchost.com 186 PID 2052 wrote to memory of 4448 2052 svchost.com 186 PID 2052 wrote to memory of 4448 2052 svchost.com 186 PID 4448 wrote to memory of 2372 4448 723254~1.EXE 98 PID 4448 wrote to memory of 2372 4448 723254~1.EXE 98 PID 4448 wrote to memory of 2372 4448 723254~1.EXE 98 PID 2372 wrote to memory of 388 2372 svchost.com 231 PID 2372 wrote to memory of 388 2372 svchost.com 231 PID 2372 wrote to memory of 388 2372 svchost.com 231 PID 388 wrote to memory of 1452 388 723254~1.EXE 257 PID 388 wrote to memory of 1452 388 723254~1.EXE 257 PID 388 wrote to memory of 1452 388 723254~1.EXE 257 PID 1452 wrote to memory of 3060 1452 svchost.com 101 PID 1452 wrote to memory of 3060 1452 svchost.com 101 PID 1452 wrote to memory of 3060 1452 svchost.com 101 PID 3060 wrote to memory of 1924 3060 723254~1.EXE 102 PID 3060 wrote to memory of 1924 3060 723254~1.EXE 102 PID 3060 wrote to memory of 1924 3060 723254~1.EXE 102 PID 1924 wrote to memory of 2952 1924 svchost.com 103 PID 1924 wrote to memory of 2952 1924 svchost.com 103 PID 1924 wrote to memory of 2952 1924 svchost.com 103 PID 2952 wrote to memory of 4052 2952 723254~1.EXE 104 PID 2952 wrote to memory of 4052 2952 723254~1.EXE 104 PID 2952 wrote to memory of 4052 2952 723254~1.EXE 104 PID 4052 wrote to memory of 1300 4052 svchost.com 105 PID 4052 wrote to memory of 1300 4052 svchost.com 105 PID 4052 wrote to memory of 1300 4052 svchost.com 105 PID 1300 wrote to memory of 400 1300 723254~1.EXE 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe"C:\Users\Admin\AppData\Local\Temp\7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"11⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"15⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"21⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"23⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"25⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"29⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"33⤵
- Executes dropped EXE
PID:736 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"35⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:8 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"43⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:60 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1408 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"49⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"51⤵
- Executes dropped EXE
PID:728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"53⤵
- Executes dropped EXE
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"55⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"59⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"65⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE66⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE68⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"69⤵
- System Location Discovery: System Language Discovery
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE70⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"71⤵
- System Location Discovery: System Language Discovery
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE72⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"73⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE74⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"75⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE76⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE78⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"79⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE80⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"81⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE82⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4128 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"83⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE84⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"85⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE86⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"87⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE88⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"89⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE90⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"91⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE92⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"93⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE94⤵
- Checks computer location settings
- Modifies registry class
PID:920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"95⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE96⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"97⤵
- Drops file in Windows directory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE98⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:1256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"99⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE100⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"101⤵
- System Location Discovery: System Language Discovery
PID:536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE102⤵
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"103⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE104⤵PID:2808
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"105⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE106⤵PID:2152
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"107⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE108⤵PID:3828
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"109⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE110⤵PID:2472
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"111⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE112⤵PID:5104
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"113⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE114⤵PID:1732
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"115⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE116⤵PID:3032
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"117⤵PID:3508
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE118⤵PID:2084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"119⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE120⤵PID:4156
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"121⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE122⤵PID:4256
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-