Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 10:25
Behavioral task
behavioral1
Sample
ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe
Resource
win10v2004-20241007-en
General
-
Target
ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe
-
Size
203KB
-
MD5
8b16945c9fee126595fcbb6fccfb66b0
-
SHA1
f23e5181c204b40623ff1b2efe6d9c9cb96756a3
-
SHA256
ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182
-
SHA512
a317523907686364fe6bf7e1aac04c685d385f655268330542290f1578d743fdd8f8a4d1969a3bab064bdb371b23bb695a760b29fc17d7c8d715d8cc3dc4a1ce
-
SSDEEP
3072:sr85CRAQUtm3XC99BqHUtm3XC99BqFr85C:k9RAvmHqZmHqW9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000d000000023a68-4.dat family_neshta behavioral2/files/0x000d000000023a69-11.dat family_neshta behavioral2/memory/1912-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3536-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1708-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4572-39-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1996-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/768-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2888-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2032-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2712-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3912-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5088-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/372-80-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/516-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4132-92-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2636-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1684-104-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002035c-113.dat family_neshta behavioral2/files/0x000600000002022f-118.dat family_neshta behavioral2/memory/4300-121-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020246-148.dat family_neshta behavioral2/memory/3632-146-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000202a8-144.dat family_neshta behavioral2/files/0x0004000000020361-143.dat family_neshta behavioral2/files/0x00010000000202c0-142.dat family_neshta behavioral2/files/0x000400000002034f-141.dat family_neshta behavioral2/files/0x000100000002023e-128.dat family_neshta behavioral2/files/0x0007000000020297-117.dat family_neshta behavioral2/memory/4864-149-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1052-162-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000021542-166.dat family_neshta behavioral2/files/0x0002000000020326-165.dat family_neshta behavioral2/memory/4164-167-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2964-181-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214eb-180.dat family_neshta behavioral2/files/0x00010000000214ec-186.dat family_neshta behavioral2/files/0x00010000000214ed-184.dat family_neshta behavioral2/files/0x0001000000022f3f-189.dat family_neshta behavioral2/memory/3448-198-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2068-217-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3804-231-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2972-241-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3260-244-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3088-247-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4572-262-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4584-274-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1932-275-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2336-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4512-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2284-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4724-300-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3860-302-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4988-308-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4132-310-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2156-316-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2744-323-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1584-324-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4852-326-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/720-332-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2268-339-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4664-340-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2844-342-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3580-348-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation AC2065~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 2316 ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe 1912 svchost.com 3536 AC2065~1.EXE 1708 svchost.com 4572 AC2065~1.EXE 1996 svchost.com 768 AC2065~1.EXE 2888 svchost.com 2032 AC2065~1.EXE 2712 svchost.com 3912 AC2065~1.EXE 5088 svchost.com 372 AC2065~1.EXE 516 svchost.com 4132 AC2065~1.EXE 2636 svchost.com 1684 AC2065~1.EXE 4300 svchost.com 3632 AC2065~1.EXE 4864 svchost.com 1052 AC2065~1.EXE 4164 svchost.com 2964 AC2065~1.EXE 3448 svchost.com 2068 AC2065~1.EXE 3804 svchost.com 2972 AC2065~1.EXE 3260 svchost.com 3088 AC2065~1.EXE 4572 svchost.com 4584 AC2065~1.EXE 1932 svchost.com 2336 AC2065~1.EXE 4512 svchost.com 2284 AC2065~1.EXE 4724 svchost.com 3860 AC2065~1.EXE 4988 svchost.com 4132 AC2065~1.EXE 2156 svchost.com 2744 AC2065~1.EXE 1584 svchost.com 4852 AC2065~1.EXE 720 svchost.com 2268 AC2065~1.EXE 4664 svchost.com 2844 AC2065~1.EXE 3580 svchost.com 3308 AC2065~1.EXE 1908 svchost.com 808 AC2065~1.EXE 2928 svchost.com 2732 AC2065~1.EXE 4364 svchost.com 2192 AC2065~1.EXE 2068 svchost.com 888 AC2065~1.EXE 4964 svchost.com 3508 AC2065~1.EXE 1836 svchost.com 2116 AC2065~1.EXE 2516 svchost.com 3604 AC2065~1.EXE 4728 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com AC2065~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys AC2065~1.EXE File opened for modification C:\Windows\svchost.com AC2065~1.EXE File opened for modification C:\Windows\svchost.com AC2065~1.EXE File opened for modification C:\Windows\svchost.com AC2065~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys AC2065~1.EXE File opened for modification C:\Windows\svchost.com AC2065~1.EXE File opened for modification C:\Windows\directx.sys AC2065~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys AC2065~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com AC2065~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys AC2065~1.EXE File opened for modification C:\Windows\directx.sys AC2065~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys AC2065~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys AC2065~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com AC2065~1.EXE File opened for modification C:\Windows\directx.sys AC2065~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys AC2065~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com AC2065~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com AC2065~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com AC2065~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys AC2065~1.EXE File opened for modification C:\Windows\directx.sys AC2065~1.EXE File opened for modification C:\Windows\directx.sys AC2065~1.EXE File opened for modification C:\Windows\directx.sys AC2065~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com AC2065~1.EXE File opened for modification C:\Windows\svchost.com AC2065~1.EXE File opened for modification C:\Windows\directx.sys AC2065~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys AC2065~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com AC2065~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com AC2065~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AC2065~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings AC2065~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4180 wrote to memory of 2316 4180 ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe 84 PID 4180 wrote to memory of 2316 4180 ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe 84 PID 4180 wrote to memory of 2316 4180 ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe 84 PID 2316 wrote to memory of 1912 2316 ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe 85 PID 2316 wrote to memory of 1912 2316 ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe 85 PID 2316 wrote to memory of 1912 2316 ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe 85 PID 1912 wrote to memory of 3536 1912 svchost.com 86 PID 1912 wrote to memory of 3536 1912 svchost.com 86 PID 1912 wrote to memory of 3536 1912 svchost.com 86 PID 3536 wrote to memory of 1708 3536 AC2065~1.EXE 87 PID 3536 wrote to memory of 1708 3536 AC2065~1.EXE 87 PID 3536 wrote to memory of 1708 3536 AC2065~1.EXE 87 PID 1708 wrote to memory of 4572 1708 svchost.com 113 PID 1708 wrote to memory of 4572 1708 svchost.com 113 PID 1708 wrote to memory of 4572 1708 svchost.com 113 PID 4572 wrote to memory of 1996 4572 AC2065~1.EXE 89 PID 4572 wrote to memory of 1996 4572 AC2065~1.EXE 89 PID 4572 wrote to memory of 1996 4572 AC2065~1.EXE 89 PID 1996 wrote to memory of 768 1996 svchost.com 90 PID 1996 wrote to memory of 768 1996 svchost.com 90 PID 1996 wrote to memory of 768 1996 svchost.com 90 PID 768 wrote to memory of 2888 768 AC2065~1.EXE 91 PID 768 wrote to memory of 2888 768 AC2065~1.EXE 91 PID 768 wrote to memory of 2888 768 AC2065~1.EXE 91 PID 2888 wrote to memory of 2032 2888 svchost.com 149 PID 2888 wrote to memory of 2032 2888 svchost.com 149 PID 2888 wrote to memory of 2032 2888 svchost.com 149 PID 2032 wrote to memory of 2712 2032 AC2065~1.EXE 93 PID 2032 wrote to memory of 2712 2032 AC2065~1.EXE 93 PID 2032 wrote to memory of 2712 2032 AC2065~1.EXE 93 PID 2712 wrote to memory of 3912 2712 svchost.com 94 PID 2712 wrote to memory of 3912 2712 svchost.com 94 PID 2712 wrote to memory of 3912 2712 svchost.com 94 PID 3912 wrote to memory of 5088 3912 AC2065~1.EXE 95 PID 3912 wrote to memory of 5088 3912 AC2065~1.EXE 95 PID 3912 wrote to memory of 5088 3912 AC2065~1.EXE 95 PID 5088 wrote to memory of 372 5088 svchost.com 96 PID 5088 wrote to memory of 372 5088 svchost.com 96 PID 5088 wrote to memory of 372 5088 svchost.com 96 PID 372 wrote to memory of 516 372 AC2065~1.EXE 97 PID 372 wrote to memory of 516 372 AC2065~1.EXE 97 PID 372 wrote to memory of 516 372 AC2065~1.EXE 97 PID 516 wrote to memory of 4132 516 svchost.com 122 PID 516 wrote to memory of 4132 516 svchost.com 122 PID 516 wrote to memory of 4132 516 svchost.com 122 PID 4132 wrote to memory of 2636 4132 AC2065~1.EXE 99 PID 4132 wrote to memory of 2636 4132 AC2065~1.EXE 99 PID 4132 wrote to memory of 2636 4132 AC2065~1.EXE 99 PID 2636 wrote to memory of 1684 2636 svchost.com 100 PID 2636 wrote to memory of 1684 2636 svchost.com 100 PID 2636 wrote to memory of 1684 2636 svchost.com 100 PID 1684 wrote to memory of 4300 1684 AC2065~1.EXE 193 PID 1684 wrote to memory of 4300 1684 AC2065~1.EXE 193 PID 1684 wrote to memory of 4300 1684 AC2065~1.EXE 193 PID 4300 wrote to memory of 3632 4300 svchost.com 197 PID 4300 wrote to memory of 3632 4300 svchost.com 197 PID 4300 wrote to memory of 3632 4300 svchost.com 197 PID 3632 wrote to memory of 4864 3632 AC2065~1.EXE 103 PID 3632 wrote to memory of 4864 3632 AC2065~1.EXE 103 PID 3632 wrote to memory of 4864 3632 AC2065~1.EXE 103 PID 4864 wrote to memory of 1052 4864 svchost.com 104 PID 4864 wrote to memory of 1052 4864 svchost.com 104 PID 4864 wrote to memory of 1052 4864 svchost.com 104 PID 1052 wrote to memory of 4164 1052 AC2065~1.EXE 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe"C:\Users\Admin\AppData\Local\Temp\ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\3582-490\ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\ac2065c5494f8d70f6bed6cf233888325913b816b9ca2d5daefef2698d428182N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"23⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE24⤵
- Executes dropped EXE
PID:2964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"25⤵
- Executes dropped EXE
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"27⤵
- Executes dropped EXE
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE30⤵
- Executes dropped EXE
PID:3088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"31⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"33⤵
- Executes dropped EXE
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE34⤵
- Executes dropped EXE
PID:2336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"37⤵
- Executes dropped EXE
PID:4724 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE38⤵
- Executes dropped EXE
- Modifies registry class
PID:3860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"39⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE40⤵
- Executes dropped EXE
- Modifies registry class
PID:4132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"41⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE42⤵
- Executes dropped EXE
- Modifies registry class
PID:2744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE44⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"45⤵
- Executes dropped EXE
PID:720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4664 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE48⤵
- Executes dropped EXE
PID:2844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE50⤵
- Executes dropped EXE
- Modifies registry class
PID:3308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"51⤵
- Executes dropped EXE
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE54⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
PID:2192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE58⤵
- Executes dropped EXE
- Modifies registry class
PID:888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"59⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE64⤵
- Executes dropped EXE
PID:3604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"65⤵
- Executes dropped EXE
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE66⤵
- Drops file in Windows directory
PID:2032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE68⤵PID:1468
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"69⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE70⤵
- Checks computer location settings
PID:4460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"71⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE72⤵PID:4724
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"73⤵
- Drops file in Windows directory
PID:3612 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE74⤵
- Checks computer location settings
PID:1604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"75⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE76⤵PID:4372
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"77⤵PID:4604
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE78⤵
- Checks computer location settings
PID:1044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"79⤵PID:1920
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE80⤵
- Modifies registry class
PID:728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"81⤵
- Drops file in Windows directory
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE82⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE84⤵PID:4556
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"85⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE86⤵
- Modifies registry class
PID:4436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"87⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE88⤵
- Checks computer location settings
PID:3256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"89⤵
- Drops file in Windows directory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE90⤵
- Checks computer location settings
PID:4884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"91⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE92⤵
- Checks computer location settings
PID:4484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"93⤵PID:3104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE94⤵
- Checks computer location settings
PID:684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"95⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE96⤵
- Drops file in Windows directory
PID:3668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"97⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE98⤵
- Checks computer location settings
PID:1468 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"99⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE100⤵PID:3460
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"101⤵
- System Location Discovery: System Language Discovery
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE102⤵
- Drops file in Windows directory
- Modifies registry class
PID:1980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"103⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE104⤵
- Checks computer location settings
- Modifies registry class
PID:1604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"105⤵
- Drops file in Windows directory
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE106⤵
- Drops file in Windows directory
- Modifies registry class
PID:2936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"107⤵
- Drops file in Windows directory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE108⤵
- Checks computer location settings
PID:4620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"109⤵
- Drops file in Windows directory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE110⤵PID:4400
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"111⤵PID:3408
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE112⤵
- Modifies registry class
PID:2940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"113⤵
- Drops file in Windows directory
PID:5020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE114⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3200 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"115⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE116⤵
- Checks computer location settings
PID:3052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"117⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE118⤵
- Checks computer location settings
- Modifies registry class
PID:3448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"119⤵
- System Location Discovery: System Language Discovery
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE120⤵
- System Location Discovery: System Language Discovery
PID:2192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE"121⤵PID:400
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AC2065~1.EXE122⤵
- Drops file in Windows directory
PID:4348
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-