Analysis
-
max time kernel
112s -
max time network
112s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 12:43
Behavioral task
behavioral1
Sample
ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe
Resource
win10v2004-20241007-en
General
-
Target
ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe
-
Size
249KB
-
MD5
5b947c4d6e59b8ccbedee940c6862110
-
SHA1
2279a75a9625f0fd5ca779c1b62dba6aeda3a8f2
-
SHA256
ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451
-
SHA512
791a2dff640721f24ebaeeab0477118f8c0b584b7233d69f6eef2db528358243144e81625090c2c47d7d44a11818d2a91a0e1e6c65dc4fe4af61d8b805422830
-
SSDEEP
3072:sr85C5+l9BdmLlX1V8EzWY1SQpavo4zc5r85C:k95+7mkPY1/GzM9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule behavioral2/files/0x0008000000023c9f-4.dat family_neshta behavioral2/files/0x0007000000023ca3-11.dat family_neshta behavioral2/memory/3152-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/852-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3352-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2296-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4132-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2556-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4804-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3448-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4904-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/900-75-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5040-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2292-79-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000700000002029a-90.dat family_neshta behavioral2/files/0x0004000000020325-106.dat family_neshta behavioral2/files/0x0006000000020249-109.dat family_neshta behavioral2/files/0x00010000000202ab-105.dat family_neshta behavioral2/files/0x0004000000020364-104.dat family_neshta behavioral2/files/0x00010000000202c3-103.dat family_neshta behavioral2/files/0x0004000000020352-102.dat family_neshta behavioral2/memory/4676-111-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1952-121-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4020-123-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1060-134-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0002000000020329-138.dat family_neshta behavioral2/memory/1476-140-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4080-155-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214f5-161.dat family_neshta behavioral2/files/0x00010000000214f7-160.dat family_neshta behavioral2/files/0x0001000000022f52-169.dat family_neshta behavioral2/files/0x00010000000167c6-187.dat family_neshta behavioral2/files/0x00010000000167c8-184.dat family_neshta behavioral2/files/0x00010000000167e7-194.dat family_neshta behavioral2/files/0x0001000000022e90-219.dat family_neshta behavioral2/files/0x000100000001696d-216.dat family_neshta behavioral2/files/0x0001000000016911-215.dat family_neshta behavioral2/files/0x0001000000016914-213.dat family_neshta behavioral2/memory/1924-205-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000016912-202.dat family_neshta behavioral2/files/0x000200000001dbc7-199.dat family_neshta behavioral2/files/0x00010000000167c2-192.dat family_neshta behavioral2/files/0x00010000000167ad-182.dat family_neshta behavioral2/files/0x00010000000167ff-181.dat family_neshta behavioral2/memory/3400-232-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2204-244-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/744-246-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4844-258-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2704-260-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4668-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2500-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4756-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2592-285-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2780-286-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2796-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/372-294-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3172-301-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4336-302-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4624-309-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1496-310-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/32-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2248-318-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2324-320-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3712-326-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
BA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exeBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEdescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation BA12FA~1.EXE -
Executes dropped EXE 64 IoCs
Processes:
ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exesvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.compid Process 2824 ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe 3152 svchost.com 852 BA12FA~1.EXE 3352 svchost.com 2296 BA12FA~1.EXE 4132 svchost.com 2556 BA12FA~1.EXE 4804 svchost.com 3448 BA12FA~1.EXE 4904 svchost.com 900 BA12FA~1.EXE 5040 svchost.com 2292 BA12FA~1.EXE 4676 svchost.com 1952 BA12FA~1.EXE 4020 svchost.com 1060 BA12FA~1.EXE 1476 svchost.com 4080 BA12FA~1.EXE 1924 svchost.com 3400 BA12FA~1.EXE 2204 svchost.com 744 BA12FA~1.EXE 4844 svchost.com 2704 BA12FA~1.EXE 4668 svchost.com 2500 BA12FA~1.EXE 4756 svchost.com 2592 BA12FA~1.EXE 2780 svchost.com 2796 BA12FA~1.EXE 372 svchost.com 3172 BA12FA~1.EXE 4336 svchost.com 4624 BA12FA~1.EXE 1496 svchost.com 32 BA12FA~1.EXE 2248 svchost.com 2324 BA12FA~1.EXE 3712 svchost.com 756 BA12FA~1.EXE 1476 svchost.com 4184 BA12FA~1.EXE 4080 svchost.com 1508 BA12FA~1.EXE 3784 svchost.com 4156 BA12FA~1.EXE 1928 svchost.com 4304 BA12FA~1.EXE 4264 svchost.com 2312 BA12FA~1.EXE 2732 svchost.com 3520 BA12FA~1.EXE 2204 svchost.com 2552 BA12FA~1.EXE 4840 svchost.com 3980 BA12FA~1.EXE 3544 svchost.com 4668 BA12FA~1.EXE 2556 svchost.com 536 BA12FA~1.EXE 2780 svchost.com 3928 BA12FA~1.EXE 1472 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exeba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exedescription ioc Process File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe -
Drops file in Windows directory 64 IoCs
Processes:
BA12FA~1.EXEsvchost.comBA12FA~1.EXEBA12FA~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comBA12FA~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comsvchost.comBA12FA~1.EXEsvchost.comsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comsvchost.comBA12FA~1.EXEBA12FA~1.EXEsvchost.comsvchost.comBA12FA~1.EXEsvchost.comsvchost.comBA12FA~1.EXEBA12FA~1.EXEsvchost.comBA12FA~1.EXEBA12FA~1.EXEsvchost.comsvchost.comBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEsvchost.comdescription ioc Process File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com BA12FA~1.EXE File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com BA12FA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com BA12FA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com BA12FA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com BA12FA~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\svchost.com BA12FA~1.EXE File opened for modification C:\Windows\svchost.com BA12FA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com BA12FA~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com BA12FA~1.EXE File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\svchost.com BA12FA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\directx.sys BA12FA~1.EXE File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.comBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEsvchost.comsvchost.comBA12FA~1.EXEsvchost.comsvchost.comBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEsvchost.comBA12FA~1.EXEBA12FA~1.EXEsvchost.comsvchost.comBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEsvchost.comsvchost.comsvchost.comBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comsvchost.comsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comsvchost.comsvchost.comBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comsvchost.comba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exesvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEsvchost.comsvchost.comdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BA12FA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
Processes:
BA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEBA12FA~1.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings BA12FA~1.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
BA12FA~1.EXEpid Process 4804 BA12FA~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exeba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exesvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEsvchost.comBA12FA~1.EXEdescription pid Process procid_target PID 436 wrote to memory of 2824 436 ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe 85 PID 436 wrote to memory of 2824 436 ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe 85 PID 436 wrote to memory of 2824 436 ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe 85 PID 2824 wrote to memory of 3152 2824 ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe 86 PID 2824 wrote to memory of 3152 2824 ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe 86 PID 2824 wrote to memory of 3152 2824 ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe 86 PID 3152 wrote to memory of 852 3152 svchost.com 87 PID 3152 wrote to memory of 852 3152 svchost.com 87 PID 3152 wrote to memory of 852 3152 svchost.com 87 PID 852 wrote to memory of 3352 852 BA12FA~1.EXE 88 PID 852 wrote to memory of 3352 852 BA12FA~1.EXE 88 PID 852 wrote to memory of 3352 852 BA12FA~1.EXE 88 PID 3352 wrote to memory of 2296 3352 svchost.com 89 PID 3352 wrote to memory of 2296 3352 svchost.com 89 PID 3352 wrote to memory of 2296 3352 svchost.com 89 PID 2296 wrote to memory of 4132 2296 BA12FA~1.EXE 90 PID 2296 wrote to memory of 4132 2296 BA12FA~1.EXE 90 PID 2296 wrote to memory of 4132 2296 BA12FA~1.EXE 90 PID 4132 wrote to memory of 2556 4132 svchost.com 91 PID 4132 wrote to memory of 2556 4132 svchost.com 91 PID 4132 wrote to memory of 2556 4132 svchost.com 91 PID 2556 wrote to memory of 4804 2556 BA12FA~1.EXE 92 PID 2556 wrote to memory of 4804 2556 BA12FA~1.EXE 92 PID 2556 wrote to memory of 4804 2556 BA12FA~1.EXE 92 PID 4804 wrote to memory of 3448 4804 svchost.com 93 PID 4804 wrote to memory of 3448 4804 svchost.com 93 PID 4804 wrote to memory of 3448 4804 svchost.com 93 PID 3448 wrote to memory of 4904 3448 BA12FA~1.EXE 94 PID 3448 wrote to memory of 4904 3448 BA12FA~1.EXE 94 PID 3448 wrote to memory of 4904 3448 BA12FA~1.EXE 94 PID 4904 wrote to memory of 900 4904 svchost.com 95 PID 4904 wrote to memory of 900 4904 svchost.com 95 PID 4904 wrote to memory of 900 4904 svchost.com 95 PID 900 wrote to memory of 5040 900 BA12FA~1.EXE 96 PID 900 wrote to memory of 5040 900 BA12FA~1.EXE 96 PID 900 wrote to memory of 5040 900 BA12FA~1.EXE 96 PID 5040 wrote to memory of 2292 5040 svchost.com 97 PID 5040 wrote to memory of 2292 5040 svchost.com 97 PID 5040 wrote to memory of 2292 5040 svchost.com 97 PID 2292 wrote to memory of 4676 2292 BA12FA~1.EXE 98 PID 2292 wrote to memory of 4676 2292 BA12FA~1.EXE 98 PID 2292 wrote to memory of 4676 2292 BA12FA~1.EXE 98 PID 4676 wrote to memory of 1952 4676 svchost.com 99 PID 4676 wrote to memory of 1952 4676 svchost.com 99 PID 4676 wrote to memory of 1952 4676 svchost.com 99 PID 1952 wrote to memory of 4020 1952 BA12FA~1.EXE 100 PID 1952 wrote to memory of 4020 1952 BA12FA~1.EXE 100 PID 1952 wrote to memory of 4020 1952 BA12FA~1.EXE 100 PID 4020 wrote to memory of 1060 4020 svchost.com 101 PID 4020 wrote to memory of 1060 4020 svchost.com 101 PID 4020 wrote to memory of 1060 4020 svchost.com 101 PID 1060 wrote to memory of 1476 1060 BA12FA~1.EXE 126 PID 1060 wrote to memory of 1476 1060 BA12FA~1.EXE 126 PID 1060 wrote to memory of 1476 1060 BA12FA~1.EXE 126 PID 1476 wrote to memory of 4080 1476 svchost.com 129 PID 1476 wrote to memory of 4080 1476 svchost.com 129 PID 1476 wrote to memory of 4080 1476 svchost.com 129 PID 4080 wrote to memory of 1924 4080 BA12FA~1.EXE 104 PID 4080 wrote to memory of 1924 4080 BA12FA~1.EXE 104 PID 4080 wrote to memory of 1924 4080 BA12FA~1.EXE 104 PID 1924 wrote to memory of 3400 1924 svchost.com 105 PID 1924 wrote to memory of 3400 1924 svchost.com 105 PID 1924 wrote to memory of 3400 1924 svchost.com 105 PID 3400 wrote to memory of 2204 3400 BA12FA~1.EXE 139
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe"C:\Users\Admin\AppData\Local\Temp\ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\ba12faf36dc84a0bbd0d18dd3cb6f8813794c782a8a023663188cf0cf7cf8451N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"15⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"23⤵
- Executes dropped EXE
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE24⤵
- Executes dropped EXE
- Modifies registry class
PID:744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"25⤵
- Executes dropped EXE
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"27⤵
- Executes dropped EXE
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
PID:2500 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"29⤵
- Executes dropped EXE
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
PID:2592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"31⤵
- Executes dropped EXE
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE32⤵
- Executes dropped EXE
- Modifies registry class
PID:2796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"33⤵
- Executes dropped EXE
PID:372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
PID:3172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"37⤵
- Executes dropped EXE
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE38⤵
- Executes dropped EXE
- Modifies registry class
PID:32 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"39⤵
- Executes dropped EXE
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE40⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"41⤵
- Executes dropped EXE
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
PID:756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"43⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"45⤵
- Executes dropped EXE
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"47⤵
- Executes dropped EXE
PID:3784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE48⤵
- Executes dropped EXE
PID:4156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"51⤵
- Executes dropped EXE
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE52⤵
- Executes dropped EXE
PID:2312 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"53⤵
- Executes dropped EXE
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE54⤵
- Executes dropped EXE
- Modifies registry class
PID:3520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"55⤵
- Executes dropped EXE
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"57⤵
- Executes dropped EXE
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"59⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE60⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"61⤵
- Executes dropped EXE
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
PID:536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE64⤵
- Executes dropped EXE
- Modifies registry class
PID:3928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"65⤵
- Executes dropped EXE
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE66⤵
- Checks computer location settings
- Modifies registry class
PID:1728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE68⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"69⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE70⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"71⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE72⤵
- Drops file in Windows directory
- Modifies registry class
PID:1672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"73⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE74⤵
- Drops file in Windows directory
- Modifies registry class
PID:4776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"75⤵PID:1344
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE76⤵
- Checks computer location settings
- Modifies registry class
PID:1404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"77⤵PID:4712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE78⤵
- Checks computer location settings
- Modifies registry class
PID:4440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"79⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE80⤵PID:4176
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"81⤵
- Drops file in Windows directory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE82⤵PID:1176
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"83⤵PID:3244
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE84⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"85⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE86⤵
- System Location Discovery: System Language Discovery
PID:4828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"87⤵PID:4668
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE88⤵
- Checks computer location settings
- Modifies registry class
PID:1760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"89⤵
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE90⤵PID:1556
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"91⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE92⤵
- Checks computer location settings
PID:3004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"93⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE94⤵
- Modifies registry class
PID:2064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"95⤵
- Drops file in Windows directory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE96⤵
- Checks computer location settings
- Drops file in Windows directory
PID:908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"97⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE98⤵PID:1496
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE100⤵PID:756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"101⤵
- Drops file in Windows directory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE102⤵
- Checks computer location settings
PID:2132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"103⤵
- Drops file in Windows directory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE104⤵
- Modifies registry class
PID:2692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"105⤵
- Drops file in Windows directory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE106⤵PID:4348
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"107⤵
- Drops file in Windows directory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE108⤵
- Modifies registry class
PID:4264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"109⤵
- System Location Discovery: System Language Discovery
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE110⤵
- Modifies registry class
PID:4192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE112⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"113⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE114⤵
- Modifies registry class
PID:1948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"115⤵
- Drops file in Windows directory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE116⤵
- Checks computer location settings
- Modifies registry class
PID:1760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"117⤵PID:4076
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE118⤵
- Checks computer location settings
PID:5064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"119⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE120⤵PID:2064
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE"121⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\BA12FA~1.EXE122⤵
- System Location Discovery: System Language Discovery
PID:4060
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-