Analysis
-
max time kernel
95s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25/11/2024, 00:41
Behavioral task
behavioral1
Sample
7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe
Resource
win10v2004-20241007-en
General
-
Target
7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe
-
Size
301KB
-
MD5
408826cfe2454311f032f323a3f62e99
-
SHA1
547d37b16f499c68e9affe4de72b644bf5321cda
-
SHA256
7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd
-
SHA512
3056ef3263c0be2b528fb92f5ddef481136d182c71f192da4b88a392d0acad616226ce31e3b2c41bc7de21e79a6dd7b984deedd5b3217d55b65c73f00e52ef58
-
SSDEEP
3072:zr8WDrCxjoByFgAsaCRSkrmfAPXSPBIFXMN3uCo//9urTWuFsxihGrJW/UmTXItd:PuqchCReAPC0XMRqGWUlxTXb0bYu
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 7CFCC6~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 2896 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 1300 svchost.com 3104 7CFCC6~1.EXE 3932 svchost.com 1880 7CFCC6~1.EXE 3640 svchost.com 1932 7CFCC6~1.EXE 3772 svchost.com 1352 7CFCC6~1.EXE 3484 svchost.com 5040 7CFCC6~1.EXE 892 svchost.com 3256 7CFCC6~1.EXE 4984 svchost.com 2828 7CFCC6~1.EXE 1976 svchost.com 4376 7CFCC6~1.EXE 3296 svchost.com 5116 7CFCC6~1.EXE 4012 svchost.com 4668 7CFCC6~1.EXE 2352 svchost.com 3540 7CFCC6~1.EXE 1072 svchost.com 1308 7CFCC6~1.EXE 4816 svchost.com 2216 7CFCC6~1.EXE 3428 svchost.com 2716 7CFCC6~1.EXE 3480 svchost.com 4492 7CFCC6~1.EXE 2160 svchost.com 464 7CFCC6~1.EXE 4620 svchost.com 2656 7CFCC6~1.EXE 1828 svchost.com 1456 7CFCC6~1.EXE 2568 svchost.com 892 7CFCC6~1.EXE 3888 svchost.com 2140 7CFCC6~1.EXE 5024 svchost.com 4272 7CFCC6~1.EXE 2028 svchost.com 4776 7CFCC6~1.EXE 1384 svchost.com 3472 7CFCC6~1.EXE 2484 svchost.com 3448 7CFCC6~1.EXE 804 svchost.com 1728 7CFCC6~1.EXE 2884 svchost.com 2268 7CFCC6~1.EXE 2288 svchost.com 4672 7CFCC6~1.EXE 2720 svchost.com 4028 7CFCC6~1.EXE 3544 svchost.com 4512 7CFCC6~1.EXE 2224 svchost.com 4524 7CFCC6~1.EXE 4988 svchost.com 4900 7CFCC6~1.EXE 1880 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com 7CFCC6~1.EXE File opened for modification C:\Windows\directx.sys 7CFCC6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Detects Pyinstaller 1 IoCs
resource yara_rule behavioral2/files/0x000a000000023b6d-4.dat pyinstaller -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7CFCC6~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 7CFCC6~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2896 2368 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 82 PID 2368 wrote to memory of 2896 2368 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 82 PID 2368 wrote to memory of 2896 2368 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 82 PID 2896 wrote to memory of 1300 2896 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 83 PID 2896 wrote to memory of 1300 2896 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 83 PID 2896 wrote to memory of 1300 2896 7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe 83 PID 1300 wrote to memory of 3104 1300 svchost.com 84 PID 1300 wrote to memory of 3104 1300 svchost.com 84 PID 1300 wrote to memory of 3104 1300 svchost.com 84 PID 3104 wrote to memory of 3932 3104 7CFCC6~1.EXE 85 PID 3104 wrote to memory of 3932 3104 7CFCC6~1.EXE 85 PID 3104 wrote to memory of 3932 3104 7CFCC6~1.EXE 85 PID 3932 wrote to memory of 1880 3932 svchost.com 86 PID 3932 wrote to memory of 1880 3932 svchost.com 86 PID 3932 wrote to memory of 1880 3932 svchost.com 86 PID 1880 wrote to memory of 3640 1880 7CFCC6~1.EXE 87 PID 1880 wrote to memory of 3640 1880 7CFCC6~1.EXE 87 PID 1880 wrote to memory of 3640 1880 7CFCC6~1.EXE 87 PID 3640 wrote to memory of 1932 3640 svchost.com 88 PID 3640 wrote to memory of 1932 3640 svchost.com 88 PID 3640 wrote to memory of 1932 3640 svchost.com 88 PID 1932 wrote to memory of 3772 1932 7CFCC6~1.EXE 89 PID 1932 wrote to memory of 3772 1932 7CFCC6~1.EXE 89 PID 1932 wrote to memory of 3772 1932 7CFCC6~1.EXE 89 PID 3772 wrote to memory of 1352 3772 svchost.com 90 PID 3772 wrote to memory of 1352 3772 svchost.com 90 PID 3772 wrote to memory of 1352 3772 svchost.com 90 PID 1352 wrote to memory of 3484 1352 7CFCC6~1.EXE 91 PID 1352 wrote to memory of 3484 1352 7CFCC6~1.EXE 91 PID 1352 wrote to memory of 3484 1352 7CFCC6~1.EXE 91 PID 3484 wrote to memory of 5040 3484 svchost.com 92 PID 3484 wrote to memory of 5040 3484 svchost.com 92 PID 3484 wrote to memory of 5040 3484 svchost.com 92 PID 5040 wrote to memory of 892 5040 7CFCC6~1.EXE 120 PID 5040 wrote to memory of 892 5040 7CFCC6~1.EXE 120 PID 5040 wrote to memory of 892 5040 7CFCC6~1.EXE 120 PID 892 wrote to memory of 3256 892 svchost.com 94 PID 892 wrote to memory of 3256 892 svchost.com 94 PID 892 wrote to memory of 3256 892 svchost.com 94 PID 3256 wrote to memory of 4984 3256 7CFCC6~1.EXE 95 PID 3256 wrote to memory of 4984 3256 7CFCC6~1.EXE 95 PID 3256 wrote to memory of 4984 3256 7CFCC6~1.EXE 95 PID 4984 wrote to memory of 2828 4984 svchost.com 96 PID 4984 wrote to memory of 2828 4984 svchost.com 96 PID 4984 wrote to memory of 2828 4984 svchost.com 96 PID 2828 wrote to memory of 1976 2828 7CFCC6~1.EXE 97 PID 2828 wrote to memory of 1976 2828 7CFCC6~1.EXE 97 PID 2828 wrote to memory of 1976 2828 7CFCC6~1.EXE 97 PID 1976 wrote to memory of 4376 1976 svchost.com 98 PID 1976 wrote to memory of 4376 1976 svchost.com 98 PID 1976 wrote to memory of 4376 1976 svchost.com 98 PID 4376 wrote to memory of 3296 4376 7CFCC6~1.EXE 99 PID 4376 wrote to memory of 3296 4376 7CFCC6~1.EXE 99 PID 4376 wrote to memory of 3296 4376 7CFCC6~1.EXE 99 PID 3296 wrote to memory of 5116 3296 svchost.com 100 PID 3296 wrote to memory of 5116 3296 svchost.com 100 PID 3296 wrote to memory of 5116 3296 svchost.com 100 PID 5116 wrote to memory of 4012 5116 7CFCC6~1.EXE 101 PID 5116 wrote to memory of 4012 5116 7CFCC6~1.EXE 101 PID 5116 wrote to memory of 4012 5116 7CFCC6~1.EXE 101 PID 4012 wrote to memory of 4668 4012 svchost.com 174 PID 4012 wrote to memory of 4668 4012 svchost.com 174 PID 4012 wrote to memory of 4668 4012 svchost.com 174 PID 4668 wrote to memory of 2352 4668 7CFCC6~1.EXE 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe"C:\Users\Admin\AppData\Local\Temp\7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\7cfcc6ec76d44fce62a7d39ecda4fdd591880e4c87b742ce9bb93176e6619dcd.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE8⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE12⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"21⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"23⤵
- Executes dropped EXE
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE24⤵
- Executes dropped EXE
- Modifies registry class
PID:3540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"25⤵
- Executes dropped EXE
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"27⤵
- Executes dropped EXE
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
PID:2216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"29⤵
- Executes dropped EXE
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE30⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"31⤵
- Executes dropped EXE
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"33⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE34⤵
- Executes dropped EXE
PID:464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"35⤵
- Executes dropped EXE
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE36⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"37⤵
- Executes dropped EXE
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE38⤵
- Executes dropped EXE
PID:1456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE40⤵
- Executes dropped EXE
- Modifies registry class
PID:892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"43⤵
- Executes dropped EXE
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
PID:4272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"45⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE46⤵
- Executes dropped EXE
PID:4776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"47⤵
- Executes dropped EXE
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
PID:3472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"49⤵
- Executes dropped EXE
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
PID:3448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"51⤵
- Executes dropped EXE
PID:804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE52⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"53⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
PID:2268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"55⤵
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE58⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE60⤵
- Executes dropped EXE
PID:4512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"63⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE64⤵
- Executes dropped EXE
- Modifies registry class
PID:4900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"65⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE66⤵
- Checks computer location settings
PID:3640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"67⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE68⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"69⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE70⤵PID:1352
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"71⤵
- System Location Discovery: System Language Discovery
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE72⤵PID:2656
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:4768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE74⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"75⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE76⤵
- Checks computer location settings
- Modifies registry class
PID:2824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"77⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE78⤵
- Checks computer location settings
- Modifies registry class
PID:2140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"79⤵
- Drops file in Windows directory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE80⤵
- Checks computer location settings
PID:1244 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"81⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE82⤵PID:624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"83⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE84⤵
- Modifies registry class
PID:4596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"85⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE86⤵
- Checks computer location settings
- Modifies registry class
PID:2580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"87⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE88⤵
- Checks computer location settings
- Modifies registry class
PID:3656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"89⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE90⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"91⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE92⤵
- Checks computer location settings
- Modifies registry class
PID:2288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"93⤵
- System Location Discovery: System Language Discovery
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE94⤵
- Checks computer location settings
PID:2956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"95⤵
- Drops file in Windows directory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE96⤵PID:4664
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"97⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE98⤵
- Modifies registry class
PID:2732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"99⤵
- Drops file in Windows directory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE100⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"101⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE102⤵
- Checks computer location settings
PID:3552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"103⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE104⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1300 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"105⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE106⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"107⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE108⤵PID:4696
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"109⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE110⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE112⤵
- Modifies registry class
PID:4024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"113⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE114⤵
- Modifies registry class
PID:4924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"115⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE116⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"117⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE118⤵PID:1016
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"119⤵
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE120⤵
- Checks computer location settings
- Drops file in Windows directory
PID:836 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE"121⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\7CFCC6~1.EXE122⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1244
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-