Analysis
-
max time kernel
33s -
max time network
101s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
17-11-2024 04:53
Behavioral task
behavioral1
Sample
0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe
Resource
win10v2004-20241007-en
General
-
Target
0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe
-
Size
136KB
-
MD5
cec1b6eeedbcb3ca65a2693ed8168b10
-
SHA1
787fc47857bfc960ce6dbe0adc4927bfa38f72ee
-
SHA256
0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786
-
SHA512
5a019f19ede30d5dce140b991f4c96afa9fe953216cf148bb015718ebe3ed93dd6787e1c50a9d7532fc61b7773df84caa709d2a6b46e018705cc36c405f95937
-
SSDEEP
1536:JxqjQ+P04wsmJCtQy0qEF0+nMSzG4pqSbi6y2xn0mOxqjQ+P04wsmJC:sr85CtQy0qEF0+nLi44Sbi6yE0cr85C
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
Processes:
resource yara_rule behavioral2/files/0x0007000000023cb0-4.dat family_neshta behavioral2/files/0x0007000000023cb1-10.dat family_neshta behavioral2/memory/368-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4796-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4988-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4148-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4760-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4696-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4028-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3772-62-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4132-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2176-74-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/536-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2204-87-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1144-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4856-92-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1984-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5052-111-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000700000002029a-115.dat family_neshta behavioral2/files/0x00010000000202ab-134.dat family_neshta behavioral2/files/0x0004000000020364-133.dat family_neshta behavioral2/memory/3412-138-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2896-149-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2108-150-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3828-161-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2136-162-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/384-172-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4104-176-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0002000000020329-180.dat family_neshta behavioral2/memory/1424-192-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214f5-198.dat family_neshta behavioral2/files/0x00010000000214f4-205.dat family_neshta behavioral2/files/0x00010000000214f6-204.dat family_neshta behavioral2/files/0x0001000000022f85-211.dat family_neshta behavioral2/files/0x0001000000022f43-210.dat family_neshta behavioral2/files/0x0001000000022f47-209.dat family_neshta behavioral2/memory/4812-241-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4444-256-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3604-257-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/740-267-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2148-268-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2132-276-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1520-293-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3824-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/832-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1260-305-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4312-319-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2328-326-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5112-327-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4384-329-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5108-335-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4468-342-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/748-343-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2184-345-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1912-351-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/60-353-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1068-359-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4372-366-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4968-367-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3308-369-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3004-375-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2892-377-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4188-383-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2016-385-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXEdescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 0B881E~1.EXE -
Executes dropped EXE 64 IoCs
Processes:
0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exesvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.compid Process 3052 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe 368 svchost.com 4796 0B881E~1.EXE 4988 svchost.com 4148 0B881E~1.EXE 4760 svchost.com 4696 0B881E~1.EXE 4028 svchost.com 3772 0B881E~1.EXE 4132 svchost.com 2176 0B881E~1.EXE 536 svchost.com 2204 0B881E~1.EXE 1144 svchost.com 4856 0B881E~1.EXE 1984 svchost.com 5052 0B881E~1.EXE 3412 svchost.com 2896 0B881E~1.EXE 2108 svchost.com 3828 0B881E~1.EXE 2136 svchost.com 384 0B881E~1.EXE 4104 svchost.com 1424 0B881E~1.EXE 4812 svchost.com 4444 0B881E~1.EXE 3604 svchost.com 740 0B881E~1.EXE 2148 svchost.com 2132 0B881E~1.EXE 1520 svchost.com 3824 0B881E~1.EXE 832 svchost.com 1260 0B881E~1.EXE 4312 svchost.com 2328 0B881E~1.EXE 5112 svchost.com 4384 0B881E~1.EXE 5108 svchost.com 4468 0B881E~1.EXE 748 svchost.com 2184 0B881E~1.EXE 1912 svchost.com 60 0B881E~1.EXE 1068 svchost.com 4372 0B881E~1.EXE 4968 svchost.com 3308 0B881E~1.EXE 3004 svchost.com 2892 0B881E~1.EXE 4188 svchost.com 2016 0B881E~1.EXE 1468 svchost.com 4764 0B881E~1.EXE 1684 svchost.com 2980 0B881E~1.EXE 4728 svchost.com 2208 0B881E~1.EXE 3692 svchost.com 3744 0B881E~1.EXE 3420 svchost.com 4616 0B881E~1.EXE 224 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exedescription ioc Process File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.com0B881E~1.EXEsvchost.com0B881E~1.EXE0B881E~1.EXE0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com0B881E~1.EXEsvchost.comsvchost.com0B881E~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com0B881E~1.EXE0B881E~1.EXE0B881E~1.EXEsvchost.com0B881E~1.EXE0B881E~1.EXE0B881E~1.EXEsvchost.com0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com0B881E~1.EXE0B881E~1.EXEsvchost.com0B881E~1.EXE0B881E~1.EXEsvchost.comsvchost.comsvchost.com0B881E~1.EXEsvchost.comsvchost.comdescription ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 0B881E~1.EXE File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\directx.sys 0B881E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 0B881E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\directx.sys 0B881E~1.EXE File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\directx.sys 0B881E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 0B881E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 0B881E~1.EXE File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\directx.sys 0B881E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\directx.sys 0B881E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 0B881E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\directx.sys 0B881E~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 0B881E~1.EXE File opened for modification C:\Windows\directx.sys 0B881E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 0B881E~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0B881E~1.EXE0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXEsvchost.comsvchost.comsvchost.com0B881E~1.EXE0B881E~1.EXEsvchost.comsvchost.com0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.comsvchost.com0B881E~1.EXE0B881E~1.EXEsvchost.com0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.comsvchost.comsvchost.comsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXE0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe0B881E~1.EXE0B881E~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com0B881E~1.EXEsvchost.comsvchost.comsvchost.com0B881E~1.EXE0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.comsvchost.comdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0B881E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
Processes:
0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXE0B881E~1.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 0B881E~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exesvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEsvchost.com0B881E~1.EXEdescription pid Process procid_target PID 2964 wrote to memory of 3052 2964 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe 84 PID 2964 wrote to memory of 3052 2964 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe 84 PID 2964 wrote to memory of 3052 2964 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe 84 PID 3052 wrote to memory of 368 3052 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe 85 PID 3052 wrote to memory of 368 3052 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe 85 PID 3052 wrote to memory of 368 3052 0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe 85 PID 368 wrote to memory of 4796 368 svchost.com 86 PID 368 wrote to memory of 4796 368 svchost.com 86 PID 368 wrote to memory of 4796 368 svchost.com 86 PID 4796 wrote to memory of 4988 4796 0B881E~1.EXE 87 PID 4796 wrote to memory of 4988 4796 0B881E~1.EXE 87 PID 4796 wrote to memory of 4988 4796 0B881E~1.EXE 87 PID 4988 wrote to memory of 4148 4988 svchost.com 88 PID 4988 wrote to memory of 4148 4988 svchost.com 88 PID 4988 wrote to memory of 4148 4988 svchost.com 88 PID 4148 wrote to memory of 4760 4148 0B881E~1.EXE 148 PID 4148 wrote to memory of 4760 4148 0B881E~1.EXE 148 PID 4148 wrote to memory of 4760 4148 0B881E~1.EXE 148 PID 4760 wrote to memory of 4696 4760 svchost.com 179 PID 4760 wrote to memory of 4696 4760 svchost.com 179 PID 4760 wrote to memory of 4696 4760 svchost.com 179 PID 4696 wrote to memory of 4028 4696 0B881E~1.EXE 91 PID 4696 wrote to memory of 4028 4696 0B881E~1.EXE 91 PID 4696 wrote to memory of 4028 4696 0B881E~1.EXE 91 PID 4028 wrote to memory of 3772 4028 svchost.com 181 PID 4028 wrote to memory of 3772 4028 svchost.com 181 PID 4028 wrote to memory of 3772 4028 svchost.com 181 PID 3772 wrote to memory of 4132 3772 0B881E~1.EXE 180 PID 3772 wrote to memory of 4132 3772 0B881E~1.EXE 180 PID 3772 wrote to memory of 4132 3772 0B881E~1.EXE 180 PID 4132 wrote to memory of 2176 4132 svchost.com 94 PID 4132 wrote to memory of 2176 4132 svchost.com 94 PID 4132 wrote to memory of 2176 4132 svchost.com 94 PID 2176 wrote to memory of 536 2176 0B881E~1.EXE 95 PID 2176 wrote to memory of 536 2176 0B881E~1.EXE 95 PID 2176 wrote to memory of 536 2176 0B881E~1.EXE 95 PID 536 wrote to memory of 2204 536 svchost.com 209 PID 536 wrote to memory of 2204 536 svchost.com 209 PID 536 wrote to memory of 2204 536 svchost.com 209 PID 2204 wrote to memory of 1144 2204 0B881E~1.EXE 97 PID 2204 wrote to memory of 1144 2204 0B881E~1.EXE 97 PID 2204 wrote to memory of 1144 2204 0B881E~1.EXE 97 PID 1144 wrote to memory of 4856 1144 svchost.com 98 PID 1144 wrote to memory of 4856 1144 svchost.com 98 PID 1144 wrote to memory of 4856 1144 svchost.com 98 PID 4856 wrote to memory of 1984 4856 0B881E~1.EXE 99 PID 4856 wrote to memory of 1984 4856 0B881E~1.EXE 99 PID 4856 wrote to memory of 1984 4856 0B881E~1.EXE 99 PID 1984 wrote to memory of 5052 1984 svchost.com 100 PID 1984 wrote to memory of 5052 1984 svchost.com 100 PID 1984 wrote to memory of 5052 1984 svchost.com 100 PID 5052 wrote to memory of 3412 5052 0B881E~1.EXE 102 PID 5052 wrote to memory of 3412 5052 0B881E~1.EXE 102 PID 5052 wrote to memory of 3412 5052 0B881E~1.EXE 102 PID 3412 wrote to memory of 2896 3412 svchost.com 164 PID 3412 wrote to memory of 2896 3412 svchost.com 164 PID 3412 wrote to memory of 2896 3412 svchost.com 164 PID 2896 wrote to memory of 2108 2896 0B881E~1.EXE 195 PID 2896 wrote to memory of 2108 2896 0B881E~1.EXE 195 PID 2896 wrote to memory of 2108 2896 0B881E~1.EXE 195 PID 2108 wrote to memory of 3828 2108 svchost.com 105 PID 2108 wrote to memory of 3828 2108 svchost.com 105 PID 2108 wrote to memory of 3828 2108 svchost.com 105 PID 3828 wrote to memory of 2136 3828 0B881E~1.EXE 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe"C:\Users\Admin\AppData\Local\Temp\0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\0b881e65b83b9650eb65a68102bb4aeebfd0813cc55e92b21f06b404fecc6786N.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4148 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE18⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"21⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"23⤵
- Executes dropped EXE
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"25⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1424 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE30⤵
- Executes dropped EXE
PID:740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"31⤵
- Executes dropped EXE
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"33⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
PID:3824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:832 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE36⤵
- Executes dropped EXE
PID:1260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2328 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4468 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"43⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"45⤵
- Executes dropped EXE
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:60 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"49⤵
- Executes dropped EXE
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"51⤵
- Executes dropped EXE
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
PID:2892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"53⤵
- Executes dropped EXE
PID:4188 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"55⤵
- Executes dropped EXE
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE56⤵
- Executes dropped EXE
PID:4764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"59⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"65⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE66⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"67⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE68⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2200 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"69⤵
- System Location Discovery: System Language Discovery
PID:100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE70⤵
- Modifies registry class
PID:1624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"71⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE72⤵
- Checks computer location settings
- Modifies registry class
PID:3936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"73⤵PID:856
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE74⤵
- Modifies registry class
PID:3664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"75⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE76⤵
- Drops file in Windows directory
PID:2896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE78⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"79⤵
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE80⤵
- Checks computer location settings
- Modifies registry class
PID:4968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"81⤵PID:3164
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE82⤵
- Drops file in Windows directory
PID:2472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"83⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE84⤵
- Modifies registry class
PID:1384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"85⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE86⤵
- Checks computer location settings
- Modifies registry class
PID:3892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"87⤵
- System Location Discovery: System Language Discovery
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE88⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"89⤵
- Drops file in Windows directory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE90⤵
- Checks computer location settings
- Modifies registry class
PID:4696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"91⤵
- System Location Discovery: System Language Discovery
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE92⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"93⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE94⤵
- Modifies registry class
PID:888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"95⤵
- Drops file in Windows directory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE96⤵
- Checks computer location settings
- Drops file in Windows directory
PID:1896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"97⤵
- System Location Discovery: System Language Discovery
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE98⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:3068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"99⤵
- Drops file in Windows directory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE100⤵
- Checks computer location settings
- Modifies registry class
PID:5020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"101⤵
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE102⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"103⤵
- Drops file in Windows directory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE104⤵
- Checks computer location settings
- Modifies registry class
PID:2108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"105⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE106⤵
- Checks computer location settings
- Modifies registry class
PID:556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"107⤵
- System Location Discovery: System Language Discovery
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE108⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"109⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE110⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"111⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE112⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:4492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"113⤵
- Drops file in Windows directory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE114⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4148 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"115⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE116⤵
- Checks computer location settings
PID:4640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"117⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE118⤵
- Checks computer location settings
- Modifies registry class
PID:2204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"119⤵
- Drops file in Windows directory
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE120⤵
- Checks computer location settings
PID:832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE"121⤵
- System Location Discovery: System Language Discovery
PID:3824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0B881E~1.EXE122⤵
- Modifies registry class
PID:1132
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-