Analysis
-
max time kernel
93s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 06:04
Static task
static1
Behavioral task
behavioral1
Sample
ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe
Resource
win10v2004-20241007-en
General
-
Target
ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe
-
Size
334KB
-
MD5
cbd55ec0a11cf6344414b28037fed7ab
-
SHA1
a2b66415e19f7a5c055c656fe3b717602fcb89e5
-
SHA256
ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5
-
SHA512
5a1ff9f7a8b4fffa10d827da20a4ef7101e6a55f023ed0574a63527d91cb516eac4884190abc505c100254922b6e750c76734438406d06196d4fca5596363c21
-
SSDEEP
3072:zr8WDrCoMeyoRJLc15QIvoKHcfAn8L2eoH0vuHimNdEMXH5yO4LP6gg/uYKr8WD2:PuRGLWoKHIAn8wuYNj5yO+6luYyu
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation FFE8EB~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 760 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 1592 svchost.com 4264 FFE8EB~1.EXE 1540 svchost.com 1084 FFE8EB~1.EXE 2028 svchost.com 4292 FFE8EB~1.EXE 3288 svchost.com 2748 FFE8EB~1.EXE 3092 svchost.com 32 FFE8EB~1.EXE 2780 svchost.com 4084 FFE8EB~1.EXE 2868 svchost.com 4844 FFE8EB~1.EXE 60 svchost.com 4432 FFE8EB~1.EXE 4216 svchost.com 4576 FFE8EB~1.EXE 4304 svchost.com 4564 FFE8EB~1.EXE 3596 svchost.com 4044 FFE8EB~1.EXE 1428 svchost.com 5052 FFE8EB~1.EXE 4368 svchost.com 2956 FFE8EB~1.EXE 5036 svchost.com 2132 FFE8EB~1.EXE 5048 svchost.com 1536 FFE8EB~1.EXE 3980 svchost.com 3736 FFE8EB~1.EXE 696 svchost.com 3840 FFE8EB~1.EXE 4500 svchost.com 3276 FFE8EB~1.EXE 3092 svchost.com 4652 FFE8EB~1.EXE 1488 svchost.com 4404 FFE8EB~1.EXE 1884 svchost.com 3716 FFE8EB~1.EXE 2880 svchost.com 1968 FFE8EB~1.EXE 4508 svchost.com 4776 FFE8EB~1.EXE 2852 svchost.com 4348 FFE8EB~1.EXE 3124 svchost.com 4860 FFE8EB~1.EXE 3368 svchost.com 3896 FFE8EB~1.EXE 2988 svchost.com 2328 FFE8EB~1.EXE 1684 svchost.com 3344 FFE8EB~1.EXE 3496 svchost.com 3800 FFE8EB~1.EXE 1316 svchost.com 1480 FFE8EB~1.EXE 3228 svchost.com 2956 FFE8EB~1.EXE 3192 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FFE8EB~1.EXE File opened for modification C:\Windows\directx.sys FFE8EB~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFE8EB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings FFE8EB~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 760 2372 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 85 PID 2372 wrote to memory of 760 2372 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 85 PID 2372 wrote to memory of 760 2372 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 85 PID 760 wrote to memory of 1592 760 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 86 PID 760 wrote to memory of 1592 760 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 86 PID 760 wrote to memory of 1592 760 ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe 86 PID 1592 wrote to memory of 4264 1592 svchost.com 87 PID 1592 wrote to memory of 4264 1592 svchost.com 87 PID 1592 wrote to memory of 4264 1592 svchost.com 87 PID 4264 wrote to memory of 1540 4264 FFE8EB~1.EXE 88 PID 4264 wrote to memory of 1540 4264 FFE8EB~1.EXE 88 PID 4264 wrote to memory of 1540 4264 FFE8EB~1.EXE 88 PID 1540 wrote to memory of 1084 1540 svchost.com 89 PID 1540 wrote to memory of 1084 1540 svchost.com 89 PID 1540 wrote to memory of 1084 1540 svchost.com 89 PID 1084 wrote to memory of 2028 1084 FFE8EB~1.EXE 90 PID 1084 wrote to memory of 2028 1084 FFE8EB~1.EXE 90 PID 1084 wrote to memory of 2028 1084 FFE8EB~1.EXE 90 PID 2028 wrote to memory of 4292 2028 svchost.com 91 PID 2028 wrote to memory of 4292 2028 svchost.com 91 PID 2028 wrote to memory of 4292 2028 svchost.com 91 PID 4292 wrote to memory of 3288 4292 FFE8EB~1.EXE 92 PID 4292 wrote to memory of 3288 4292 FFE8EB~1.EXE 92 PID 4292 wrote to memory of 3288 4292 FFE8EB~1.EXE 92 PID 3288 wrote to memory of 2748 3288 svchost.com 93 PID 3288 wrote to memory of 2748 3288 svchost.com 93 PID 3288 wrote to memory of 2748 3288 svchost.com 93 PID 2748 wrote to memory of 3092 2748 FFE8EB~1.EXE 124 PID 2748 wrote to memory of 3092 2748 FFE8EB~1.EXE 124 PID 2748 wrote to memory of 3092 2748 FFE8EB~1.EXE 124 PID 3092 wrote to memory of 32 3092 svchost.com 95 PID 3092 wrote to memory of 32 3092 svchost.com 95 PID 3092 wrote to memory of 32 3092 svchost.com 95 PID 32 wrote to memory of 2780 32 FFE8EB~1.EXE 164 PID 32 wrote to memory of 2780 32 FFE8EB~1.EXE 164 PID 32 wrote to memory of 2780 32 FFE8EB~1.EXE 164 PID 2780 wrote to memory of 4084 2780 svchost.com 97 PID 2780 wrote to memory of 4084 2780 svchost.com 97 PID 2780 wrote to memory of 4084 2780 svchost.com 97 PID 4084 wrote to memory of 2868 4084 FFE8EB~1.EXE 98 PID 4084 wrote to memory of 2868 4084 FFE8EB~1.EXE 98 PID 4084 wrote to memory of 2868 4084 FFE8EB~1.EXE 98 PID 2868 wrote to memory of 4844 2868 svchost.com 99 PID 2868 wrote to memory of 4844 2868 svchost.com 99 PID 2868 wrote to memory of 4844 2868 svchost.com 99 PID 4844 wrote to memory of 60 4844 FFE8EB~1.EXE 100 PID 4844 wrote to memory of 60 4844 FFE8EB~1.EXE 100 PID 4844 wrote to memory of 60 4844 FFE8EB~1.EXE 100 PID 60 wrote to memory of 4432 60 svchost.com 101 PID 60 wrote to memory of 4432 60 svchost.com 101 PID 60 wrote to memory of 4432 60 svchost.com 101 PID 4432 wrote to memory of 4216 4432 FFE8EB~1.EXE 102 PID 4432 wrote to memory of 4216 4432 FFE8EB~1.EXE 102 PID 4432 wrote to memory of 4216 4432 FFE8EB~1.EXE 102 PID 4216 wrote to memory of 4576 4216 svchost.com 103 PID 4216 wrote to memory of 4576 4216 svchost.com 103 PID 4216 wrote to memory of 4576 4216 svchost.com 103 PID 4576 wrote to memory of 4304 4576 FFE8EB~1.EXE 104 PID 4576 wrote to memory of 4304 4576 FFE8EB~1.EXE 104 PID 4576 wrote to memory of 4304 4576 FFE8EB~1.EXE 104 PID 4304 wrote to memory of 4564 4304 svchost.com 105 PID 4304 wrote to memory of 4564 4304 svchost.com 105 PID 4304 wrote to memory of 4564 4304 svchost.com 105 PID 4564 wrote to memory of 3596 4564 FFE8EB~1.EXE 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe"C:\Users\Admin\AppData\Local\Temp\ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\ffe8ebf1900570d1cb65f2c871374bb29510d7aa0538dc99c275c6ac1b25d3f5.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE14⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE18⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"19⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"23⤵
- Executes dropped EXE
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE24⤵
- Executes dropped EXE
- Modifies registry class
PID:4044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"25⤵
- Executes dropped EXE
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE26⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"27⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE28⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"29⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE30⤵
- Executes dropped EXE
- Modifies registry class
PID:2132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"31⤵
- Executes dropped EXE
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE32⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"33⤵
- Executes dropped EXE
PID:3980 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
PID:3840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"37⤵
- Executes dropped EXE
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
PID:3276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"41⤵
- Executes dropped EXE
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"43⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE44⤵
- Executes dropped EXE
PID:3716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"45⤵
- Executes dropped EXE
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE46⤵
- Executes dropped EXE
- Modifies registry class
PID:1968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE48⤵
- Executes dropped EXE
- Modifies registry class
PID:4776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"49⤵
- Executes dropped EXE
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"51⤵
- Executes dropped EXE
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE52⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"53⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE54⤵
- Executes dropped EXE
PID:3896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"55⤵
- Executes dropped EXE
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE56⤵
- Executes dropped EXE
PID:2328 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"57⤵
- Executes dropped EXE
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"59⤵
- Executes dropped EXE
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE60⤵
- Executes dropped EXE
PID:3800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"63⤵
- Executes dropped EXE
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
PID:2956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE66⤵
- Checks computer location settings
- Modifies registry class
PID:2132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"67⤵
- Drops file in Windows directory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE68⤵
- Modifies registry class
PID:1584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"69⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE70⤵
- Checks computer location settings
PID:3256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"71⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE72⤵
- Modifies registry class
PID:3272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"73⤵PID:3540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE74⤵PID:684
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE76⤵
- System Location Discovery: System Language Discovery
PID:4856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"77⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE78⤵PID:3728
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"79⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE80⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"81⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE82⤵PID:4508
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE84⤵
- Modifies registry class
PID:836 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"85⤵
- System Location Discovery: System Language Discovery
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE86⤵PID:1496
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"87⤵PID:4912
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE88⤵
- Modifies registry class
PID:3368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"89⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE90⤵
- Drops file in Windows directory
PID:2988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"91⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE92⤵PID:1684
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"93⤵
- Drops file in Windows directory
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE94⤵
- Modifies registry class
PID:636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"95⤵PID:1616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE96⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"97⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE98⤵PID:5036
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"99⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE100⤵
- Checks computer location settings
PID:4160 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"101⤵PID:3980
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE102⤵PID:1572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"103⤵PID:732
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE104⤵PID:3440
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"105⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE106⤵PID:3084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"107⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE108⤵
- Checks computer location settings
- Modifies registry class
PID:380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"109⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE110⤵PID:1884
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"111⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE112⤵
- Checks computer location settings
- Modifies registry class
PID:2540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"113⤵
- Drops file in Windows directory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE114⤵
- Drops file in Windows directory
- Modifies registry class
PID:4508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"115⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE116⤵PID:2348
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"117⤵
- Drops file in Windows directory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE118⤵
- Checks computer location settings
PID:2692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"119⤵
- Drops file in Windows directory
PID:5080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE120⤵PID:1984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE"121⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FFE8EB~1.EXE122⤵PID:2988
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-