Analysis
-
max time kernel
97s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-11-2024 05:20
Behavioral task
behavioral1
Sample
a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe
Resource
win10v2004-20241007-en
General
-
Target
a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe
-
Size
145KB
-
MD5
ed8744089a21fbf0c57cd808b8cfae40
-
SHA1
9ef953f272b1541e68f728a167edd164e660ebfc
-
SHA256
a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdf
-
SHA512
b4aaa5c0b82a18eda782f73ee4fedc59190fd89bb0cb1223a85fcd63751e28eede40bafdfdf65f9e0df7c7ef8df3929f3a465eb0b08f99baa96074f2804cd120
-
SSDEEP
1536:JxqjQ+P04wsmJCjzmn+B79k1L3lxy7MrQ1lOxqjQ+P04wsmJC:sr85CjzncYXr85C
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule behavioral2/files/0x0008000000023c92-4.dat family_neshta behavioral2/files/0x0007000000023c96-10.dat family_neshta behavioral2/memory/2608-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1664-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2788-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1700-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4300-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4472-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5036-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4688-59-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2488-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5048-74-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2460-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3224-87-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000600000002023a-93.dat family_neshta behavioral2/files/0x0006000000020232-92.dat family_neshta behavioral2/files/0x0004000000020352-101.dat family_neshta behavioral2/files/0x00010000000202b0-100.dat family_neshta behavioral2/files/0x0001000000020241-99.dat family_neshta behavioral2/memory/4704-108-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1380-112-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4032-120-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3940-130-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4528-132-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020251-137.dat family_neshta behavioral2/files/0x0002000000020329-148.dat family_neshta behavioral2/memory/2908-138-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214f5-152.dat family_neshta behavioral2/files/0x00010000000214f6-156.dat family_neshta behavioral2/memory/3216-158-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f8e-180.dat family_neshta behavioral2/memory/4584-178-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167c2-194.dat family_neshta behavioral2/files/0x0001000000016852-189.dat family_neshta behavioral2/files/0x00010000000167c6-188.dat family_neshta behavioral2/files/0x00010000000167c8-187.dat family_neshta behavioral2/files/0x00010000000167ad-186.dat family_neshta behavioral2/files/0x00010000000167e6-202.dat family_neshta behavioral2/memory/2228-208-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000100000001dbd0-205.dat family_neshta behavioral2/files/0x000200000001dbc7-204.dat family_neshta behavioral2/memory/1912-230-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167c0-203.dat family_neshta behavioral2/memory/244-231-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3728-240-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3220-250-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4232-257-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3308-263-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3080-265-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5036-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3948-273-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/788-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/408-281-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2764-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2820-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3468-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1660-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3884-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4388-310-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5092-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4776-318-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1380-319-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4908-326-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2480-327-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
A96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEdescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation A96EF2~1.EXE -
Executes dropped EXE 64 IoCs
Processes:
a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exesvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.compid Process 3676 a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe 2608 svchost.com 1664 A96EF2~1.EXE 2788 svchost.com 1700 A96EF2~1.EXE 4300 svchost.com 4472 A96EF2~1.EXE 5036 svchost.com 4688 A96EF2~1.EXE 2488 svchost.com 5048 A96EF2~1.EXE 2460 svchost.com 3224 A96EF2~1.EXE 4704 svchost.com 1380 A96EF2~1.EXE 4032 svchost.com 3940 A96EF2~1.EXE 4528 svchost.com 2908 A96EF2~1.EXE 3216 svchost.com 4584 A96EF2~1.EXE 2228 svchost.com 1912 A96EF2~1.EXE 244 svchost.com 3728 A96EF2~1.EXE 3220 svchost.com 4232 A96EF2~1.EXE 3308 svchost.com 3080 A96EF2~1.EXE 5036 svchost.com 3948 A96EF2~1.EXE 788 svchost.com 408 A96EF2~1.EXE 2764 svchost.com 2820 A96EF2~1.EXE 3468 svchost.com 1660 A96EF2~1.EXE 3884 svchost.com 4388 A96EF2~1.EXE 5092 svchost.com 4776 A96EF2~1.EXE 1380 svchost.com 4908 A96EF2~1.EXE 2480 svchost.com 2312 A96EF2~1.EXE 2544 svchost.com 4636 A96EF2~1.EXE 4920 svchost.com 968 A96EF2~1.EXE 448 svchost.com 3976 A96EF2~1.EXE 4008 svchost.com 4440 A96EF2~1.EXE 3672 svchost.com 4252 A96EF2~1.EXE 2516 svchost.com 2428 A96EF2~1.EXE 3084 svchost.com 3068 A96EF2~1.EXE 4696 svchost.com 3652 A96EF2~1.EXE 8 svchost.com 1920 A96EF2~1.EXE 3080 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exea96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exedescription ioc Process File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe -
Drops file in Windows directory 64 IoCs
Processes:
A96EF2~1.EXEsvchost.comsvchost.comsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEA96EF2~1.EXEsvchost.comA96EF2~1.EXEA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comsvchost.comsvchost.comA96EF2~1.EXEA96EF2~1.EXEsvchost.comsvchost.comsvchost.comA96EF2~1.EXEA96EF2~1.EXEsvchost.comsvchost.comA96EF2~1.EXEsvchost.comsvchost.comA96EF2~1.EXEA96EF2~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comA96EF2~1.EXEsvchost.comsvchost.comA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEsvchost.comA96EF2~1.EXEA96EF2~1.EXEsvchost.comsvchost.comA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEdescription ioc Process File opened for modification C:\Windows\directx.sys A96EF2~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com A96EF2~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com A96EF2~1.EXE File opened for modification C:\Windows\directx.sys A96EF2~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com A96EF2~1.EXE File opened for modification C:\Windows\svchost.com A96EF2~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com A96EF2~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com A96EF2~1.EXE File opened for modification C:\Windows\directx.sys A96EF2~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com A96EF2~1.EXE File opened for modification C:\Windows\svchost.com A96EF2~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys A96EF2~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys A96EF2~1.EXE File opened for modification C:\Windows\directx.sys A96EF2~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys A96EF2~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys A96EF2~1.EXE File opened for modification C:\Windows\svchost.com A96EF2~1.EXE File opened for modification C:\Windows\svchost.com A96EF2~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys A96EF2~1.EXE File opened for modification C:\Windows\svchost.com A96EF2~1.EXE File opened for modification C:\Windows\directx.sys A96EF2~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com A96EF2~1.EXE File opened for modification C:\Windows\svchost.com A96EF2~1.EXE File opened for modification C:\Windows\svchost.com A96EF2~1.EXE File opened for modification C:\Windows\svchost.com A96EF2~1.EXE File opened for modification C:\Windows\directx.sys A96EF2~1.EXE File opened for modification C:\Windows\svchost.com A96EF2~1.EXE File opened for modification C:\Windows\directx.sys A96EF2~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys A96EF2~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys A96EF2~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.comA96EF2~1.EXEA96EF2~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEA96EF2~1.EXEsvchost.comsvchost.comA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEsvchost.comsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comsvchost.comsvchost.comsvchost.coma96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exeA96EF2~1.EXEsvchost.comA96EF2~1.EXEA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEsvchost.comdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A96EF2~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
Processes:
A96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEa96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exeA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEA96EF2~1.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings A96EF2~1.EXE -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
A96EF2~1.EXEpid Process 1992 A96EF2~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exea96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exesvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEsvchost.comA96EF2~1.EXEdescription pid Process procid_target PID 2588 wrote to memory of 3676 2588 a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe 85 PID 2588 wrote to memory of 3676 2588 a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe 85 PID 2588 wrote to memory of 3676 2588 a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe 85 PID 3676 wrote to memory of 2608 3676 a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe 86 PID 3676 wrote to memory of 2608 3676 a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe 86 PID 3676 wrote to memory of 2608 3676 a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe 86 PID 2608 wrote to memory of 1664 2608 svchost.com 87 PID 2608 wrote to memory of 1664 2608 svchost.com 87 PID 2608 wrote to memory of 1664 2608 svchost.com 87 PID 1664 wrote to memory of 2788 1664 A96EF2~1.EXE 88 PID 1664 wrote to memory of 2788 1664 A96EF2~1.EXE 88 PID 1664 wrote to memory of 2788 1664 A96EF2~1.EXE 88 PID 2788 wrote to memory of 1700 2788 svchost.com 89 PID 2788 wrote to memory of 1700 2788 svchost.com 89 PID 2788 wrote to memory of 1700 2788 svchost.com 89 PID 1700 wrote to memory of 4300 1700 A96EF2~1.EXE 90 PID 1700 wrote to memory of 4300 1700 A96EF2~1.EXE 90 PID 1700 wrote to memory of 4300 1700 A96EF2~1.EXE 90 PID 4300 wrote to memory of 4472 4300 svchost.com 91 PID 4300 wrote to memory of 4472 4300 svchost.com 91 PID 4300 wrote to memory of 4472 4300 svchost.com 91 PID 4472 wrote to memory of 5036 4472 A96EF2~1.EXE 114 PID 4472 wrote to memory of 5036 4472 A96EF2~1.EXE 114 PID 4472 wrote to memory of 5036 4472 A96EF2~1.EXE 114 PID 5036 wrote to memory of 4688 5036 svchost.com 93 PID 5036 wrote to memory of 4688 5036 svchost.com 93 PID 5036 wrote to memory of 4688 5036 svchost.com 93 PID 4688 wrote to memory of 2488 4688 A96EF2~1.EXE 94 PID 4688 wrote to memory of 2488 4688 A96EF2~1.EXE 94 PID 4688 wrote to memory of 2488 4688 A96EF2~1.EXE 94 PID 2488 wrote to memory of 5048 2488 svchost.com 95 PID 2488 wrote to memory of 5048 2488 svchost.com 95 PID 2488 wrote to memory of 5048 2488 svchost.com 95 PID 5048 wrote to memory of 2460 5048 A96EF2~1.EXE 96 PID 5048 wrote to memory of 2460 5048 A96EF2~1.EXE 96 PID 5048 wrote to memory of 2460 5048 A96EF2~1.EXE 96 PID 2460 wrote to memory of 3224 2460 svchost.com 97 PID 2460 wrote to memory of 3224 2460 svchost.com 97 PID 2460 wrote to memory of 3224 2460 svchost.com 97 PID 3224 wrote to memory of 4704 3224 A96EF2~1.EXE 98 PID 3224 wrote to memory of 4704 3224 A96EF2~1.EXE 98 PID 3224 wrote to memory of 4704 3224 A96EF2~1.EXE 98 PID 4704 wrote to memory of 1380 4704 svchost.com 126 PID 4704 wrote to memory of 1380 4704 svchost.com 126 PID 4704 wrote to memory of 1380 4704 svchost.com 126 PID 1380 wrote to memory of 4032 1380 A96EF2~1.EXE 100 PID 1380 wrote to memory of 4032 1380 A96EF2~1.EXE 100 PID 1380 wrote to memory of 4032 1380 A96EF2~1.EXE 100 PID 4032 wrote to memory of 3940 4032 svchost.com 101 PID 4032 wrote to memory of 3940 4032 svchost.com 101 PID 4032 wrote to memory of 3940 4032 svchost.com 101 PID 3940 wrote to memory of 4528 3940 A96EF2~1.EXE 102 PID 3940 wrote to memory of 4528 3940 A96EF2~1.EXE 102 PID 3940 wrote to memory of 4528 3940 A96EF2~1.EXE 102 PID 4528 wrote to memory of 2908 4528 svchost.com 103 PID 4528 wrote to memory of 2908 4528 svchost.com 103 PID 4528 wrote to memory of 2908 4528 svchost.com 103 PID 2908 wrote to memory of 3216 2908 A96EF2~1.EXE 104 PID 2908 wrote to memory of 3216 2908 A96EF2~1.EXE 104 PID 2908 wrote to memory of 3216 2908 A96EF2~1.EXE 104 PID 3216 wrote to memory of 4584 3216 svchost.com 236 PID 3216 wrote to memory of 4584 3216 svchost.com 236 PID 3216 wrote to memory of 4584 3216 svchost.com 236 PID 4584 wrote to memory of 2228 4584 A96EF2~1.EXE 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe"C:\Users\Admin\AppData\Local\Temp\a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\a96ef24a628fd12d3c4c38263aaa6031071187eae4e6962142d8d9d217eabfdfN.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE18⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"23⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
PID:1912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"25⤵
- Executes dropped EXE
PID:244 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"27⤵
- Executes dropped EXE
PID:3220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4232 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
PID:3080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE32⤵
- Executes dropped EXE
PID:3948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:408 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"35⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE36⤵
- Executes dropped EXE
PID:2820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"37⤵
- Executes dropped EXE
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE38⤵
- Executes dropped EXE
- Modifies registry class
PID:1660 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"39⤵
- Executes dropped EXE
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
PID:4388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"43⤵
- Executes dropped EXE
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE44⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"45⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2312 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"47⤵
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE48⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"49⤵
- Executes dropped EXE
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE52⤵
- Executes dropped EXE
- Modifies registry class
PID:3976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"53⤵
- Executes dropped EXE
PID:4008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"55⤵
- Executes dropped EXE
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"59⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
PID:3068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"63⤵
- Executes dropped EXE
PID:8 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"65⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE66⤵
- Modifies registry class
PID:396 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"67⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE68⤵PID:376
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"69⤵PID:4356
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE70⤵PID:5068
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"71⤵
- System Location Discovery: System Language Discovery
PID:692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE72⤵PID:428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE74⤵
- Checks computer location settings
PID:3884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE76⤵PID:2640
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"77⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE78⤵
- Checks computer location settings
- Modifies registry class
PID:904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"79⤵
- System Location Discovery: System Language Discovery
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE80⤵
- Checks computer location settings
PID:1004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"81⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE82⤵PID:4808
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"83⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE84⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"85⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE86⤵PID:2032
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"87⤵
- System Location Discovery: System Language Discovery
PID:340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE88⤵
- Checks computer location settings
- Modifies registry class
PID:4068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"89⤵PID:4884
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE90⤵
- Modifies registry class
PID:4556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"91⤵PID:3824
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE92⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"93⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE94⤵
- Checks computer location settings
PID:3192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"95⤵
- System Location Discovery: System Language Discovery
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE96⤵
- Drops file in Windows directory
PID:3308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"97⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE98⤵PID:2332
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"99⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE100⤵PID:4400
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"101⤵
- Drops file in Windows directory
PID:396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE102⤵PID:1608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"103⤵
- Drops file in Windows directory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE104⤵
- Drops file in Windows directory
PID:544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"105⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE106⤵
- Checks computer location settings
- Drops file in Windows directory
PID:660 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"107⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE108⤵PID:400
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"109⤵
- Drops file in Windows directory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE110⤵
- Checks computer location settings
- Modifies registry class
PID:4452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"111⤵
- Drops file in Windows directory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE112⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:4776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"113⤵PID:2104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE114⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"115⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE116⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"117⤵PID:864
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE118⤵
- System Location Discovery: System Language Discovery
PID:3936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"119⤵PID:3668
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE120⤵
- System Location Discovery: System Language Discovery
PID:3976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE"121⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A96EF2~1.EXE122⤵
- System Location Discovery: System Language Discovery
PID:340
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-