Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 01:22
Static task
static1
Behavioral task
behavioral1
Sample
8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe
Resource
win10v2004-20241007-en
General
-
Target
8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe
-
Size
803KB
-
MD5
47d08da30094ecebe28a42af6b172dc6
-
SHA1
b0a56e72d5883818dbead15a30d2607adf76424a
-
SHA256
8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814
-
SHA512
028d198574399ef68b5e9e41faa979f546ef1250f8f13e91901e37270e5783ded3542605db15b28de9f95b5c88cd4ff28170d6c7be920b33b7b6df2caeb03940
-
SSDEEP
24576:sY2gUfVH5XlVYzagW4/3rn0Y5zmzRf1P2MVMl:DENH5X3ngbrnL5yzpVM
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 8FFA3A~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 400 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 2144 svchost.com 3472 8FFA3A~1.EXE 1384 svchost.com 5016 8FFA3A~1.EXE 2404 svchost.com 1148 8FFA3A~1.EXE 2712 svchost.com 2672 8FFA3A~1.EXE 3992 svchost.com 3548 8FFA3A~1.EXE 1132 svchost.com 1604 8FFA3A~1.EXE 2932 svchost.com 3568 8FFA3A~1.EXE 3340 svchost.com 1528 8FFA3A~1.EXE 4456 svchost.com 3212 8FFA3A~1.EXE 2604 svchost.com 2908 8FFA3A~1.EXE 2452 svchost.com 5068 8FFA3A~1.EXE 4172 svchost.com 4368 8FFA3A~1.EXE 4628 svchost.com 4840 8FFA3A~1.EXE 2964 svchost.com 4428 8FFA3A~1.EXE 1964 svchost.com 3124 8FFA3A~1.EXE 2576 svchost.com 2712 8FFA3A~1.EXE 2612 svchost.com 2164 8FFA3A~1.EXE 4756 svchost.com 2508 8FFA3A~1.EXE 1104 svchost.com 2924 8FFA3A~1.EXE 1084 svchost.com 4604 8FFA3A~1.EXE 2128 svchost.com 2148 8FFA3A~1.EXE 3212 svchost.com 4276 8FFA3A~1.EXE 3768 svchost.com 1960 8FFA3A~1.EXE 2848 svchost.com 1772 8FFA3A~1.EXE 5068 svchost.com 5028 8FFA3A~1.EXE 3284 svchost.com 3348 8FFA3A~1.EXE 4424 svchost.com 4996 8FFA3A~1.EXE 4616 svchost.com 2368 8FFA3A~1.EXE 2144 svchost.com 3112 8FFA3A~1.EXE 1316 svchost.com 848 8FFA3A~1.EXE 1996 svchost.com 3260 8FFA3A~1.EXE 3316 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 8FFA3A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8FFA3A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 8FFA3A~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3772 wrote to memory of 400 3772 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 83 PID 3772 wrote to memory of 400 3772 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 83 PID 3772 wrote to memory of 400 3772 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 83 PID 400 wrote to memory of 2144 400 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 140 PID 400 wrote to memory of 2144 400 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 140 PID 400 wrote to memory of 2144 400 8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe 140 PID 2144 wrote to memory of 3472 2144 svchost.com 173 PID 2144 wrote to memory of 3472 2144 svchost.com 173 PID 2144 wrote to memory of 3472 2144 svchost.com 173 PID 3472 wrote to memory of 1384 3472 8FFA3A~1.EXE 86 PID 3472 wrote to memory of 1384 3472 8FFA3A~1.EXE 86 PID 3472 wrote to memory of 1384 3472 8FFA3A~1.EXE 86 PID 1384 wrote to memory of 5016 1384 svchost.com 87 PID 1384 wrote to memory of 5016 1384 svchost.com 87 PID 1384 wrote to memory of 5016 1384 svchost.com 87 PID 5016 wrote to memory of 2404 5016 8FFA3A~1.EXE 88 PID 5016 wrote to memory of 2404 5016 8FFA3A~1.EXE 88 PID 5016 wrote to memory of 2404 5016 8FFA3A~1.EXE 88 PID 2404 wrote to memory of 1148 2404 svchost.com 89 PID 2404 wrote to memory of 1148 2404 svchost.com 89 PID 2404 wrote to memory of 1148 2404 svchost.com 89 PID 1148 wrote to memory of 2712 1148 8FFA3A~1.EXE 90 PID 1148 wrote to memory of 2712 1148 8FFA3A~1.EXE 90 PID 1148 wrote to memory of 2712 1148 8FFA3A~1.EXE 90 PID 2712 wrote to memory of 2672 2712 svchost.com 91 PID 2712 wrote to memory of 2672 2712 svchost.com 91 PID 2712 wrote to memory of 2672 2712 svchost.com 91 PID 2672 wrote to memory of 3992 2672 8FFA3A~1.EXE 92 PID 2672 wrote to memory of 3992 2672 8FFA3A~1.EXE 92 PID 2672 wrote to memory of 3992 2672 8FFA3A~1.EXE 92 PID 3992 wrote to memory of 3548 3992 svchost.com 93 PID 3992 wrote to memory of 3548 3992 svchost.com 93 PID 3992 wrote to memory of 3548 3992 svchost.com 93 PID 3548 wrote to memory of 1132 3548 8FFA3A~1.EXE 94 PID 3548 wrote to memory of 1132 3548 8FFA3A~1.EXE 94 PID 3548 wrote to memory of 1132 3548 8FFA3A~1.EXE 94 PID 1132 wrote to memory of 1604 1132 svchost.com 95 PID 1132 wrote to memory of 1604 1132 svchost.com 95 PID 1132 wrote to memory of 1604 1132 svchost.com 95 PID 1604 wrote to memory of 2932 1604 8FFA3A~1.EXE 96 PID 1604 wrote to memory of 2932 1604 8FFA3A~1.EXE 96 PID 1604 wrote to memory of 2932 1604 8FFA3A~1.EXE 96 PID 2932 wrote to memory of 3568 2932 svchost.com 97 PID 2932 wrote to memory of 3568 2932 svchost.com 97 PID 2932 wrote to memory of 3568 2932 svchost.com 97 PID 3568 wrote to memory of 3340 3568 8FFA3A~1.EXE 98 PID 3568 wrote to memory of 3340 3568 8FFA3A~1.EXE 98 PID 3568 wrote to memory of 3340 3568 8FFA3A~1.EXE 98 PID 3340 wrote to memory of 1528 3340 svchost.com 196 PID 3340 wrote to memory of 1528 3340 svchost.com 196 PID 3340 wrote to memory of 1528 3340 svchost.com 196 PID 1528 wrote to memory of 4456 1528 8FFA3A~1.EXE 100 PID 1528 wrote to memory of 4456 1528 8FFA3A~1.EXE 100 PID 1528 wrote to memory of 4456 1528 8FFA3A~1.EXE 100 PID 4456 wrote to memory of 3212 4456 svchost.com 162 PID 4456 wrote to memory of 3212 4456 svchost.com 162 PID 4456 wrote to memory of 3212 4456 svchost.com 162 PID 3212 wrote to memory of 2604 3212 8FFA3A~1.EXE 237 PID 3212 wrote to memory of 2604 3212 8FFA3A~1.EXE 237 PID 3212 wrote to memory of 2604 3212 8FFA3A~1.EXE 237 PID 2604 wrote to memory of 2908 2604 svchost.com 103 PID 2604 wrote to memory of 2908 2604 svchost.com 103 PID 2604 wrote to memory of 2908 2604 svchost.com 103 PID 2908 wrote to memory of 2452 2908 8FFA3A~1.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe"C:\Users\Admin\AppData\Local\Temp\8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\8ffa3acb6719dd908f5e3ca114ed6b961691da2464bbf304152b8df8e2040814.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"11⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:5068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"25⤵
- Executes dropped EXE
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
PID:4368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE28⤵
- Executes dropped EXE
PID:4840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"29⤵
- Executes dropped EXE
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
PID:4428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"33⤵
- Executes dropped EXE
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE34⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE36⤵
- Executes dropped EXE
- Modifies registry class
PID:2164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE40⤵
- Executes dropped EXE
PID:2924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"41⤵
- Executes dropped EXE
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE42⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"43⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE44⤵
- Executes dropped EXE
- Modifies registry class
PID:2148 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"45⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE46⤵
- Executes dropped EXE
PID:4276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"47⤵
- Executes dropped EXE
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"49⤵
- Executes dropped EXE
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"51⤵
- Executes dropped EXE
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE52⤵
- Executes dropped EXE
PID:5028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"53⤵
- Executes dropped EXE
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE54⤵
- Executes dropped EXE
PID:3348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE58⤵
- Executes dropped EXE
PID:2368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"59⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE60⤵
- Executes dropped EXE
PID:3112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE62⤵
- Executes dropped EXE
PID:848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"63⤵
- Executes dropped EXE
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
PID:3260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"65⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE66⤵PID:3964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"67⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE68⤵PID:4512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"69⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE70⤵
- Modifies registry class
PID:5036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"71⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE72⤵PID:3552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"73⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE74⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"75⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE76⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"77⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE78⤵
- Checks computer location settings
PID:1680 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"79⤵PID:3212
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE80⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"81⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE82⤵
- Modifies registry class
PID:3948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE84⤵PID:4932
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"85⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE86⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"87⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE88⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3660 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"89⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE90⤵
- System Location Discovery: System Language Discovery
PID:3472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"91⤵PID:228
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE92⤵
- Modifies registry class
PID:2056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"93⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE94⤵
- Checks computer location settings
PID:4048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"95⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE96⤵PID:4320
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"97⤵
- System Location Discovery: System Language Discovery
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE98⤵
- Checks computer location settings
PID:4928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"99⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE100⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"101⤵PID:4532
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE102⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"103⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE104⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"105⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE106⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"107⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE108⤵
- Checks computer location settings
PID:5008 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"109⤵PID:4584
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE110⤵
- Checks computer location settings
PID:1528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"111⤵
- Drops file in Windows directory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE112⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:1220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"113⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE114⤵
- System Location Discovery: System Language Discovery
PID:3768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"115⤵
- Drops file in Windows directory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE116⤵PID:3120
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"117⤵PID:4536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE118⤵PID:2408
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"119⤵
- Drops file in Windows directory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE120⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3312 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE"121⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\8FFA3A~1.EXE122⤵
- System Location Discovery: System Language Discovery
PID:5104
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-