Analysis
-
max time kernel
51s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 00:33
Behavioral task
behavioral1
Sample
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe
Resource
win10v2004-20241007-en
General
-
Target
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe
-
Size
253KB
-
MD5
d54b7905893774b4896e54bf5c75d790
-
SHA1
e074def1b0083e3ee24a264904891540d8101d12
-
SHA256
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a
-
SHA512
8f99bfc222db409553af25bceb1ee3866f5a9dd4fead718b37da636f97c0a045346c4083cce566a8e383f37afa1751506aea8670feeb124e3ee19ef2c96cf96c
-
SSDEEP
3072:sr85CwBxR1qJmcv8fyOolexayyyyjU1eEYr85C:k9wBxRTcv8faIAH9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule behavioral2/files/0x0008000000023c9a-4.dat family_neshta behavioral2/files/0x0008000000023c9b-10.dat family_neshta behavioral2/memory/3060-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2520-26-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5076-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1224-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1120-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4672-51-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3720-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1832-63-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002034d-64.dat family_neshta behavioral2/files/0x0006000000020228-71.dat family_neshta behavioral2/files/0x0006000000020220-70.dat family_neshta behavioral2/files/0x000100000002022f-76.dat family_neshta behavioral2/files/0x000400000002033f-75.dat family_neshta behavioral2/files/0x0004000000020352-83.dat family_neshta behavioral2/files/0x00010000000202b1-82.dat family_neshta behavioral2/memory/3836-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3168-92-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2340-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3276-111-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2348-112-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/872-116-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0008000000020241-126.dat family_neshta behavioral2/files/0x0001000000021539-129.dat family_neshta behavioral2/files/0x00010000000214e3-133.dat family_neshta behavioral2/files/0x00010000000214e4-139.dat family_neshta behavioral2/files/0x00010000000214e2-138.dat family_neshta behavioral2/files/0x0001000000022f33-141.dat family_neshta behavioral2/files/0x00010000000167b0-155.dat family_neshta behavioral2/files/0x0001000000016802-154.dat family_neshta behavioral2/memory/1620-162-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167c5-165.dat family_neshta behavioral2/memory/2724-185-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000016919-192.dat family_neshta behavioral2/files/0x0001000000016914-197.dat family_neshta behavioral2/files/0x0001000000016913-191.dat family_neshta behavioral2/files/0x0001000000016917-190.dat family_neshta behavioral2/files/0x000100000001dbdb-181.dat family_neshta behavioral2/files/0x00010000000167c3-180.dat family_neshta behavioral2/files/0x000300000001e866-208.dat family_neshta behavioral2/memory/5040-211-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4436-220-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4400-230-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4460-232-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3092-242-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1788-245-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2756-250-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1224-257-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3396-264-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/312-267-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/732-268-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5060-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4440-276-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1972-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2676-284-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3836-291-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3272-292-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2572-294-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1920-300-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4468-302-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1416-308-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2904-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4596-318-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXEdescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 723254~1.EXE -
Executes dropped EXE 64 IoCs
Processes:
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exesvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.compid Process 3788 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 3060 svchost.com 2520 723254~1.EXE 5076 svchost.com 1224 723254~1.EXE 1120 svchost.com 4672 723254~1.EXE 3720 svchost.com 1832 723254~1.EXE 3836 svchost.com 3168 723254~1.EXE 2340 svchost.com 3276 723254~1.EXE 2348 svchost.com 872 723254~1.EXE 1620 svchost.com 2724 723254~1.EXE 5040 svchost.com 4436 723254~1.EXE 4400 svchost.com 4460 723254~1.EXE 3092 svchost.com 1788 723254~1.EXE 2756 svchost.com 1224 723254~1.EXE 3396 svchost.com 312 723254~1.EXE 732 svchost.com 5060 723254~1.EXE 4440 svchost.com 1972 723254~1.EXE 2676 svchost.com 3836 723254~1.EXE 3272 svchost.com 2572 723254~1.EXE 1920 svchost.com 4468 723254~1.EXE 1416 svchost.com 2904 723254~1.EXE 4596 svchost.com 4716 723254~1.EXE 3116 svchost.com 2132 723254~1.EXE 420 svchost.com 2644 723254~1.EXE 632 svchost.com 4976 723254~1.EXE 4024 svchost.com 5112 723254~1.EXE 1532 svchost.com 4964 723254~1.EXE 1712 svchost.com 4288 723254~1.EXE 5052 svchost.com 4956 723254~1.EXE 3624 svchost.com 2292 723254~1.EXE 1468 svchost.com 3368 723254~1.EXE 3456 svchost.com 4992 723254~1.EXE 2940 svchost.com 3592 723254~1.EXE 1504 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exedescription ioc Process File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe -
Drops file in Windows directory 64 IoCs
Processes:
723254~1.EXE723254~1.EXE723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXE723254~1.EXE723254~1.EXEsvchost.comsvchost.comsvchost.com723254~1.EXE723254~1.EXE723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.comsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXEdescription ioc Process File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\svchost.com 723254~1.EXE File opened for modification C:\Windows\directx.sys 723254~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.comsvchost.comsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.com723254~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com723254~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com723254~1.EXEsvchost.comsvchost.com723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.com723254~1.EXEsvchost.comsvchost.comsvchost.com723254~1.EXE723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com723254~1.EXE723254~1.EXEsvchost.comsvchost.com723254~1.EXE723254~1.EXE723254~1.EXEsvchost.com723254~1.EXEsvchost.comsvchost.com723254~1.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 723254~1.EXE -
Modifies registry class 64 IoCs
Processes:
723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXE723254~1.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 723254~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exesvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEsvchost.com723254~1.EXEdescription pid Process procid_target PID 3584 wrote to memory of 3788 3584 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 84 PID 3584 wrote to memory of 3788 3584 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 84 PID 3584 wrote to memory of 3788 3584 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 84 PID 3788 wrote to memory of 3060 3788 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 85 PID 3788 wrote to memory of 3060 3788 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 85 PID 3788 wrote to memory of 3060 3788 7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe 85 PID 3060 wrote to memory of 2520 3060 svchost.com 86 PID 3060 wrote to memory of 2520 3060 svchost.com 86 PID 3060 wrote to memory of 2520 3060 svchost.com 86 PID 2520 wrote to memory of 5076 2520 723254~1.EXE 87 PID 2520 wrote to memory of 5076 2520 723254~1.EXE 87 PID 2520 wrote to memory of 5076 2520 723254~1.EXE 87 PID 5076 wrote to memory of 1224 5076 svchost.com 111 PID 5076 wrote to memory of 1224 5076 svchost.com 111 PID 5076 wrote to memory of 1224 5076 svchost.com 111 PID 1224 wrote to memory of 1120 1224 723254~1.EXE 89 PID 1224 wrote to memory of 1120 1224 723254~1.EXE 89 PID 1224 wrote to memory of 1120 1224 723254~1.EXE 89 PID 1120 wrote to memory of 4672 1120 svchost.com 198 PID 1120 wrote to memory of 4672 1120 svchost.com 198 PID 1120 wrote to memory of 4672 1120 svchost.com 198 PID 4672 wrote to memory of 3720 4672 723254~1.EXE 91 PID 4672 wrote to memory of 3720 4672 723254~1.EXE 91 PID 4672 wrote to memory of 3720 4672 723254~1.EXE 91 PID 3720 wrote to memory of 1832 3720 svchost.com 92 PID 3720 wrote to memory of 1832 3720 svchost.com 92 PID 3720 wrote to memory of 1832 3720 svchost.com 92 PID 1832 wrote to memory of 3836 1832 723254~1.EXE 119 PID 1832 wrote to memory of 3836 1832 723254~1.EXE 119 PID 1832 wrote to memory of 3836 1832 723254~1.EXE 119 PID 3836 wrote to memory of 3168 3836 svchost.com 94 PID 3836 wrote to memory of 3168 3836 svchost.com 94 PID 3836 wrote to memory of 3168 3836 svchost.com 94 PID 3168 wrote to memory of 2340 3168 723254~1.EXE 244 PID 3168 wrote to memory of 2340 3168 723254~1.EXE 244 PID 3168 wrote to memory of 2340 3168 723254~1.EXE 244 PID 2340 wrote to memory of 3276 2340 svchost.com 207 PID 2340 wrote to memory of 3276 2340 svchost.com 207 PID 2340 wrote to memory of 3276 2340 svchost.com 207 PID 3276 wrote to memory of 2348 3276 723254~1.EXE 98 PID 3276 wrote to memory of 2348 3276 723254~1.EXE 98 PID 3276 wrote to memory of 2348 3276 723254~1.EXE 98 PID 2348 wrote to memory of 872 2348 svchost.com 99 PID 2348 wrote to memory of 872 2348 svchost.com 99 PID 2348 wrote to memory of 872 2348 svchost.com 99 PID 872 wrote to memory of 1620 872 723254~1.EXE 131 PID 872 wrote to memory of 1620 872 723254~1.EXE 131 PID 872 wrote to memory of 1620 872 723254~1.EXE 131 PID 1620 wrote to memory of 2724 1620 svchost.com 101 PID 1620 wrote to memory of 2724 1620 svchost.com 101 PID 1620 wrote to memory of 2724 1620 svchost.com 101 PID 2724 wrote to memory of 5040 2724 723254~1.EXE 280 PID 2724 wrote to memory of 5040 2724 723254~1.EXE 280 PID 2724 wrote to memory of 5040 2724 723254~1.EXE 280 PID 5040 wrote to memory of 4436 5040 svchost.com 104 PID 5040 wrote to memory of 4436 5040 svchost.com 104 PID 5040 wrote to memory of 4436 5040 svchost.com 104 PID 4436 wrote to memory of 4400 4436 723254~1.EXE 194 PID 4436 wrote to memory of 4400 4436 723254~1.EXE 194 PID 4436 wrote to memory of 4400 4436 723254~1.EXE 194 PID 4400 wrote to memory of 4460 4400 svchost.com 171 PID 4400 wrote to memory of 4460 4400 svchost.com 171 PID 4400 wrote to memory of 4460 4400 svchost.com 171 PID 4460 wrote to memory of 3092 4460 723254~1.EXE 258
Processes
-
C:\Users\Admin\AppData\Local\Temp\7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe"C:\Users\Admin\AppData\Local\Temp\7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\7232543634b98df35a0352a8f936a296635cf86c241656a431f49dfe6b9f4e1a.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"19⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"23⤵
- Executes dropped EXE
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
PID:1788 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE26⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE28⤵
- Executes dropped EXE
- Modifies registry class
PID:312 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"29⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:5060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
PID:1972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE34⤵
- Executes dropped EXE
PID:3836 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"35⤵
- Executes dropped EXE
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"37⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE38⤵
- Executes dropped EXE
PID:4468 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"39⤵
- Executes dropped EXE
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE40⤵
- Executes dropped EXE
- Modifies registry class
PID:2904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"43⤵
- Executes dropped EXE
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"45⤵
- Executes dropped EXE
PID:420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"49⤵
- Executes dropped EXE
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE50⤵
- Executes dropped EXE
PID:5112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"51⤵
- Executes dropped EXE
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
PID:4964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"55⤵
- Executes dropped EXE
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"57⤵
- Executes dropped EXE
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
PID:3368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
PID:4992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
PID:3592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"65⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE66⤵PID:1220
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"67⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE68⤵
- Modifies registry class
PID:1028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"69⤵PID:3528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE70⤵
- Checks computer location settings
PID:5020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"71⤵
- System Location Discovery: System Language Discovery
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE72⤵
- Modifies registry class
PID:3756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"73⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE74⤵
- System Location Discovery: System Language Discovery
PID:3312 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"75⤵
- Drops file in Windows directory
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE76⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE78⤵
- Checks computer location settings
PID:3180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"79⤵
- System Location Discovery: System Language Discovery
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE80⤵
- Checks computer location settings
PID:3060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"81⤵
- System Location Discovery: System Language Discovery
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE82⤵PID:1988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"83⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE84⤵PID:3100
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"85⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE86⤵
- Modifies registry class
PID:1956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"87⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE88⤵PID:2996
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"89⤵PID:4652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE90⤵
- Drops file in Windows directory
PID:2136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"91⤵
- System Location Discovery: System Language Discovery
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE92⤵
- Modifies registry class
PID:3276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"93⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE94⤵PID:552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"95⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE96⤵
- Checks computer location settings
- Modifies registry class
PID:3760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"97⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE98⤵PID:3432
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"99⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE100⤵
- Modifies registry class
PID:2032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"101⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE102⤵
- Checks computer location settings
PID:5040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"103⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE104⤵
- Modifies registry class
PID:4400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"105⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE106⤵PID:3644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"107⤵PID:244
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE108⤵PID:216
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"109⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE110⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"111⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE112⤵
- Checks computer location settings
PID:3592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"113⤵
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE114⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"115⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE116⤵
- Modifies registry class
PID:3116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE118⤵PID:4888
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"119⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE120⤵
- Modifies registry class
PID:3580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE"121⤵PID:4300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\723254~1.EXE122⤵
- Checks computer location settings
PID:4336
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-