Analysis
-
max time kernel
61s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 05:37
Static task
static1
Behavioral task
behavioral1
Sample
f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe
Resource
win10v2004-20241007-en
General
-
Target
f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe
-
Size
1.4MB
-
MD5
da0dabd3074a2f56d1239bf8c1cb5ecc
-
SHA1
6a872ac401adc8a44326a0ef14cd215ac9eceacc
-
SHA256
f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c
-
SHA512
aa158a2196849c7a66b309c81022f2222576c00bea9716357be788d83a0ca1e815dc2c9636a2e0d830e007f14979ed4df6e94e2e5ef67f3229d07e652db3106a
-
SSDEEP
24576:epaiGhP1x+96UBz1V/7hw5CILSbvCDpmdLq9zyMfNyAGW6xRZzXeyNbgQF:BiI1k9/HYCtMpK2zyM45fzuYbgQF
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation F4A905~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 1576 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 1060 svchost.com 652 F4A905~1.EXE 1872 svchost.com 4960 F4A905~1.EXE 2184 svchost.com 624 F4A905~1.EXE 3076 svchost.com 3276 F4A905~1.EXE 4268 svchost.com 2720 F4A905~1.EXE 3692 svchost.com 772 F4A905~1.EXE 2636 svchost.com 1908 F4A905~1.EXE 116 svchost.com 3864 F4A905~1.EXE 2796 svchost.com 4472 F4A905~1.EXE 3492 svchost.com 2700 F4A905~1.EXE 4360 svchost.com 2992 F4A905~1.EXE 3112 svchost.com 3896 F4A905~1.EXE 4704 svchost.com 3500 F4A905~1.EXE 3696 svchost.com 2388 F4A905~1.EXE 4784 svchost.com 2164 F4A905~1.EXE 2124 svchost.com 1692 F4A905~1.EXE 3880 svchost.com 2652 F4A905~1.EXE 556 svchost.com 4980 F4A905~1.EXE 2292 svchost.com 4400 F4A905~1.EXE 2864 svchost.com 1560 F4A905~1.EXE 1064 svchost.com 1760 F4A905~1.EXE 3592 svchost.com 3088 F4A905~1.EXE 4460 svchost.com 4136 F4A905~1.EXE 3484 svchost.com 3052 F4A905~1.EXE 388 svchost.com 2968 F4A905~1.EXE 4472 svchost.com 1372 F4A905~1.EXE 1308 svchost.com 2964 F4A905~1.EXE 1392 svchost.com 1836 F4A905~1.EXE 2000 svchost.com 3804 F4A905~1.EXE 3500 svchost.com 4960 F4A905~1.EXE 2608 svchost.com 624 F4A905~1.EXE 4232 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\directx.sys F4A905~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F4A905~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F4A905~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F4A905~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings F4A905~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3024 wrote to memory of 1576 3024 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 83 PID 3024 wrote to memory of 1576 3024 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 83 PID 3024 wrote to memory of 1576 3024 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 83 PID 1576 wrote to memory of 1060 1576 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 84 PID 1576 wrote to memory of 1060 1576 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 84 PID 1576 wrote to memory of 1060 1576 f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe 84 PID 1060 wrote to memory of 652 1060 svchost.com 85 PID 1060 wrote to memory of 652 1060 svchost.com 85 PID 1060 wrote to memory of 652 1060 svchost.com 85 PID 652 wrote to memory of 1872 652 F4A905~1.EXE 86 PID 652 wrote to memory of 1872 652 F4A905~1.EXE 86 PID 652 wrote to memory of 1872 652 F4A905~1.EXE 86 PID 1872 wrote to memory of 4960 1872 svchost.com 87 PID 1872 wrote to memory of 4960 1872 svchost.com 87 PID 1872 wrote to memory of 4960 1872 svchost.com 87 PID 4960 wrote to memory of 2184 4960 F4A905~1.EXE 88 PID 4960 wrote to memory of 2184 4960 F4A905~1.EXE 88 PID 4960 wrote to memory of 2184 4960 F4A905~1.EXE 88 PID 2184 wrote to memory of 624 2184 svchost.com 89 PID 2184 wrote to memory of 624 2184 svchost.com 89 PID 2184 wrote to memory of 624 2184 svchost.com 89 PID 624 wrote to memory of 3076 624 F4A905~1.EXE 90 PID 624 wrote to memory of 3076 624 F4A905~1.EXE 90 PID 624 wrote to memory of 3076 624 F4A905~1.EXE 90 PID 3076 wrote to memory of 3276 3076 svchost.com 91 PID 3076 wrote to memory of 3276 3076 svchost.com 91 PID 3076 wrote to memory of 3276 3076 svchost.com 91 PID 3276 wrote to memory of 4268 3276 F4A905~1.EXE 92 PID 3276 wrote to memory of 4268 3276 F4A905~1.EXE 92 PID 3276 wrote to memory of 4268 3276 F4A905~1.EXE 92 PID 4268 wrote to memory of 2720 4268 svchost.com 93 PID 4268 wrote to memory of 2720 4268 svchost.com 93 PID 4268 wrote to memory of 2720 4268 svchost.com 93 PID 2720 wrote to memory of 3692 2720 F4A905~1.EXE 94 PID 2720 wrote to memory of 3692 2720 F4A905~1.EXE 94 PID 2720 wrote to memory of 3692 2720 F4A905~1.EXE 94 PID 3692 wrote to memory of 772 3692 svchost.com 95 PID 3692 wrote to memory of 772 3692 svchost.com 95 PID 3692 wrote to memory of 772 3692 svchost.com 95 PID 772 wrote to memory of 2636 772 F4A905~1.EXE 96 PID 772 wrote to memory of 2636 772 F4A905~1.EXE 96 PID 772 wrote to memory of 2636 772 F4A905~1.EXE 96 PID 2636 wrote to memory of 1908 2636 svchost.com 97 PID 2636 wrote to memory of 1908 2636 svchost.com 97 PID 2636 wrote to memory of 1908 2636 svchost.com 97 PID 1908 wrote to memory of 116 1908 F4A905~1.EXE 98 PID 1908 wrote to memory of 116 1908 F4A905~1.EXE 98 PID 1908 wrote to memory of 116 1908 F4A905~1.EXE 98 PID 116 wrote to memory of 3864 116 svchost.com 99 PID 116 wrote to memory of 3864 116 svchost.com 99 PID 116 wrote to memory of 3864 116 svchost.com 99 PID 3864 wrote to memory of 2796 3864 F4A905~1.EXE 100 PID 3864 wrote to memory of 2796 3864 F4A905~1.EXE 100 PID 3864 wrote to memory of 2796 3864 F4A905~1.EXE 100 PID 2796 wrote to memory of 4472 2796 svchost.com 138 PID 2796 wrote to memory of 4472 2796 svchost.com 138 PID 2796 wrote to memory of 4472 2796 svchost.com 138 PID 4472 wrote to memory of 3492 4472 F4A905~1.EXE 102 PID 4472 wrote to memory of 3492 4472 F4A905~1.EXE 102 PID 4472 wrote to memory of 3492 4472 F4A905~1.EXE 102 PID 3492 wrote to memory of 2700 3492 svchost.com 103 PID 3492 wrote to memory of 2700 3492 svchost.com 103 PID 3492 wrote to memory of 2700 3492 svchost.com 103 PID 2700 wrote to memory of 4360 2700 F4A905~1.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe"C:\Users\Admin\AppData\Local\Temp\f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\f4a9055f6eb03dfe4fc0420ccf8e6218dce26069c29fce0fbe63c1ad15e83e1c.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"15⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"23⤵
- Executes dropped EXE
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE24⤵
- Executes dropped EXE
- Modifies registry class
PID:2992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE26⤵
- Executes dropped EXE
PID:3896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"27⤵
- Executes dropped EXE
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3500 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"29⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE30⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE32⤵
- Executes dropped EXE
- Modifies registry class
PID:2164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"33⤵
- Executes dropped EXE
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE34⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE36⤵
- Executes dropped EXE
PID:2652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"37⤵
- Executes dropped EXE
PID:556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE38⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"39⤵
- Executes dropped EXE
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE40⤵
- Executes dropped EXE
PID:4400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"41⤵
- Executes dropped EXE
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"43⤵
- Executes dropped EXE
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE44⤵
- Executes dropped EXE
PID:1760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE46⤵
- Executes dropped EXE
PID:3088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"47⤵
- Executes dropped EXE
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE50⤵
- Executes dropped EXE
PID:3052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"51⤵
- Executes dropped EXE
PID:388 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"53⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE54⤵
- Executes dropped EXE
PID:1372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"55⤵
- Executes dropped EXE
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
PID:2964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
PID:1836 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
PID:3804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE62⤵
- Executes dropped EXE
PID:4960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"63⤵
- Executes dropped EXE
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE64⤵
- Executes dropped EXE
PID:624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE66⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"67⤵
- Drops file in Windows directory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE68⤵
- Modifies registry class
PID:3964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"69⤵
- Drops file in Windows directory
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE70⤵PID:5032
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"71⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE72⤵
- Checks computer location settings
- Modifies registry class
PID:3456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"73⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE74⤵PID:3596
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"75⤵PID:1116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE76⤵
- Modifies registry class
PID:3428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"77⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE78⤵
- Modifies registry class
PID:1096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"79⤵
- Drops file in Windows directory
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE80⤵
- Checks computer location settings
- Modifies registry class
PID:4136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"81⤵PID:768
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE82⤵PID:3968
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"83⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE84⤵
- Drops file in Windows directory
- Modifies registry class
PID:3148 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"85⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE86⤵
- Modifies registry class
PID:1308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"87⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE88⤵
- Checks computer location settings
- Modifies registry class
PID:1392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"89⤵
- System Location Discovery: System Language Discovery
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE90⤵PID:2160
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"91⤵PID:4456
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE92⤵
- Modifies registry class
PID:4928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"93⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE94⤵PID:4428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"95⤵PID:3076
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE96⤵
- Checks computer location settings
PID:2164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"97⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE98⤵
- Modifies registry class
PID:3080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"99⤵
- Drops file in Windows directory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE100⤵PID:3272
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"101⤵
- System Location Discovery: System Language Discovery
PID:1864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE102⤵
- Checks computer location settings
PID:1380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"103⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE104⤵PID:3624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"105⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE106⤵PID:1416
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"107⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE108⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"109⤵
- Drops file in Windows directory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE110⤵
- Checks computer location settings
PID:1252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"111⤵
- Drops file in Windows directory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE112⤵PID:4108
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"113⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE114⤵PID:3920
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"115⤵PID:672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE116⤵
- Checks computer location settings
PID:2772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"117⤵PID:4500
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE118⤵
- System Location Discovery: System Language Discovery
PID:3484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"119⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE120⤵
- Checks computer location settings
PID:3704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE"121⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F4A905~1.EXE122⤵PID:5056
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-