Analysis
-
max time kernel
52s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 23:40
Behavioral task
behavioral1
Sample
126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe
Resource
win10v2004-20241007-en
General
-
Target
126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe
-
Size
1.0MB
-
MD5
37c56f70b2b41a67ffe99228240ca840
-
SHA1
3bd51b79299fd7260f68b189cfc13fb77759b138
-
SHA256
126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fc
-
SHA512
124e4afc88bcfbab0c338a464bf107e6bdbb830cdb5009887bb1a5e625861f23ca9745784a30c35b6a68b54158aa04e3102ac557df860f4d40c2638528646d35
-
SSDEEP
24576:ja6rfyCY3YSXzaCNaCNaCNaCNaCNaCNaCNaCNa61:JG3Y653333333P1
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0009000000023bcd-8.dat family_neshta behavioral2/files/0x0009000000023bcf-15.dat family_neshta behavioral2/files/0x0008000000023bd5-24.dat family_neshta behavioral2/memory/100-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2376-41-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2628-42-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/892-53-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2176-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1260-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/740-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2056-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2404-78-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/656-82-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2608-90-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020232-103.dat family_neshta behavioral2/memory/4612-108-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000202ab-123.dat family_neshta behavioral2/files/0x0004000000020364-122.dat family_neshta behavioral2/files/0x00010000000202c3-120.dat family_neshta behavioral2/files/0x0004000000020352-119.dat family_neshta behavioral2/files/0x00010000000202b0-118.dat family_neshta behavioral2/files/0x0001000000020241-117.dat family_neshta behavioral2/files/0x000700000002029a-102.dat family_neshta behavioral2/memory/784-127-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2412-138-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4940-139-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1972-153-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0008000000020253-152.dat family_neshta behavioral2/files/0x00010000000214f7-166.dat family_neshta behavioral2/files/0x00010000000214f6-165.dat family_neshta behavioral2/files/0x00010000000214f5-164.dat family_neshta behavioral2/files/0x0001000000022f51-171.dat family_neshta behavioral2/files/0x0001000000022f8e-181.dat family_neshta behavioral2/files/0x0001000000022f4f-178.dat family_neshta behavioral2/files/0x0001000000016802-189.dat family_neshta behavioral2/files/0x000200000001dbc7-198.dat family_neshta behavioral2/files/0x0001000000016914-210.dat family_neshta behavioral2/files/0x0001000000022f52-177.dat family_neshta behavioral2/files/0x00020000000215e5-217.dat family_neshta behavioral2/files/0x000200000000072b-215.dat family_neshta behavioral2/memory/2616-218-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3956-225-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2476-226-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4492-243-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4916-246-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4584-250-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2916-251-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2732-253-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1256-260-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1200-262-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/320-268-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4928-275-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3608-276-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4748-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1448-284-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2280-286-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4856-292-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/116-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/732-300-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3748-302-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3628-308-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2076-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4456-316-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4004-318-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 126B26~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 1148 svchost.exe 1172 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe 4392 svchost.exe 1028 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe 100 svchost.com 2376 126B26~1.EXE 2628 svchost.com 892 126B26~1.EXE 2176 svchost.com 1260 126B26~1.EXE 740 svchost.com 2056 126B26~1.EXE 2404 svchost.com 656 126B26~1.EXE 2608 svchost.com 4612 126B26~1.EXE 784 svchost.com 2412 126B26~1.EXE 4940 svchost.com 1972 126B26~1.EXE 2616 svchost.com 3956 126B26~1.EXE 2476 svchost.com 4492 126B26~1.EXE 4916 svchost.com 4584 126B26~1.EXE 2916 svchost.com 2732 126B26~1.EXE 1256 svchost.com 1200 126B26~1.EXE 320 svchost.com 4928 126B26~1.EXE 3608 svchost.com 4748 126B26~1.EXE 1448 svchost.com 2280 126B26~1.EXE 4856 svchost.com 116 126B26~1.EXE 732 svchost.com 3748 126B26~1.EXE 3628 svchost.com 2076 126B26~1.EXE 4456 svchost.com 4004 126B26~1.EXE 2608 svchost.com 1192 126B26~1.EXE 2700 svchost.com 4616 126B26~1.EXE 3168 svchost.com 3940 126B26~1.EXE 3500 svchost.com 4940 126B26~1.EXE 4640 svchost.com 744 126B26~1.EXE 4912 svchost.com 2148 126B26~1.EXE 2708 svchost.com 4752 126B26~1.EXE 1980 svchost.com 2616 126B26~1.EXE 4828 svchost.com 4488 126B26~1.EXE 4952 svchost.com 2892 126B26~1.EXE -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 126B26~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 126B26~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 126B26~1.EXE File opened for modification C:\Windows\directx.sys 126B26~1.EXE File opened for modification C:\Windows\directx.sys 126B26~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 126B26~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 126B26~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 126B26~1.EXE File opened for modification C:\Windows\svchost.com 126B26~1.EXE File opened for modification C:\Windows\directx.sys 126B26~1.EXE File opened for modification C:\Windows\directx.sys 126B26~1.EXE File opened for modification C:\Windows\svchost.com 126B26~1.EXE File opened for modification C:\Windows\directx.sys 126B26~1.EXE File opened for modification C:\Windows\svchost.com 126B26~1.EXE File opened for modification C:\Windows\svchost.com 126B26~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 126B26~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 126B26~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 126B26~1.EXE File opened for modification C:\Windows\svchost.com 126B26~1.EXE File opened for modification C:\Windows\directx.sys 126B26~1.EXE File opened for modification C:\Windows\directx.sys 126B26~1.EXE File opened for modification C:\Windows\svchost.com 126B26~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 126B26~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 126B26~1.EXE File opened for modification C:\Windows\svchost.com 126B26~1.EXE File opened for modification C:\Windows\directx.sys 126B26~1.EXE File opened for modification C:\Windows\directx.sys 126B26~1.EXE File opened for modification C:\Windows\directx.sys 126B26~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 126B26~1.EXE File opened for modification C:\Windows\svchost.com 126B26~1.EXE File opened for modification C:\Windows\directx.sys 126B26~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 126B26~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 126B26~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 126B26~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 224 wrote to memory of 1148 224 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe 83 PID 224 wrote to memory of 1148 224 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe 83 PID 224 wrote to memory of 1148 224 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe 83 PID 1148 wrote to memory of 1172 1148 svchost.exe 84 PID 1148 wrote to memory of 1172 1148 svchost.exe 84 PID 1148 wrote to memory of 1172 1148 svchost.exe 84 PID 1172 wrote to memory of 1028 1172 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe 86 PID 1172 wrote to memory of 1028 1172 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe 86 PID 1172 wrote to memory of 1028 1172 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe 86 PID 1028 wrote to memory of 100 1028 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe 87 PID 1028 wrote to memory of 100 1028 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe 87 PID 1028 wrote to memory of 100 1028 126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe 87 PID 100 wrote to memory of 2376 100 svchost.com 88 PID 100 wrote to memory of 2376 100 svchost.com 88 PID 100 wrote to memory of 2376 100 svchost.com 88 PID 2376 wrote to memory of 2628 2376 126B26~1.EXE 89 PID 2376 wrote to memory of 2628 2376 126B26~1.EXE 89 PID 2376 wrote to memory of 2628 2376 126B26~1.EXE 89 PID 2628 wrote to memory of 892 2628 svchost.com 90 PID 2628 wrote to memory of 892 2628 svchost.com 90 PID 2628 wrote to memory of 892 2628 svchost.com 90 PID 892 wrote to memory of 2176 892 126B26~1.EXE 91 PID 892 wrote to memory of 2176 892 126B26~1.EXE 91 PID 892 wrote to memory of 2176 892 126B26~1.EXE 91 PID 2176 wrote to memory of 1260 2176 svchost.com 92 PID 2176 wrote to memory of 1260 2176 svchost.com 92 PID 2176 wrote to memory of 1260 2176 svchost.com 92 PID 1260 wrote to memory of 740 1260 126B26~1.EXE 93 PID 1260 wrote to memory of 740 1260 126B26~1.EXE 93 PID 1260 wrote to memory of 740 1260 126B26~1.EXE 93 PID 740 wrote to memory of 2056 740 svchost.com 94 PID 740 wrote to memory of 2056 740 svchost.com 94 PID 740 wrote to memory of 2056 740 svchost.com 94 PID 2056 wrote to memory of 2404 2056 126B26~1.EXE 95 PID 2056 wrote to memory of 2404 2056 126B26~1.EXE 95 PID 2056 wrote to memory of 2404 2056 126B26~1.EXE 95 PID 2404 wrote to memory of 656 2404 svchost.com 96 PID 2404 wrote to memory of 656 2404 svchost.com 96 PID 2404 wrote to memory of 656 2404 svchost.com 96 PID 656 wrote to memory of 2608 656 126B26~1.EXE 127 PID 656 wrote to memory of 2608 656 126B26~1.EXE 127 PID 656 wrote to memory of 2608 656 126B26~1.EXE 127 PID 2608 wrote to memory of 4612 2608 svchost.com 98 PID 2608 wrote to memory of 4612 2608 svchost.com 98 PID 2608 wrote to memory of 4612 2608 svchost.com 98 PID 4612 wrote to memory of 784 4612 126B26~1.EXE 99 PID 4612 wrote to memory of 784 4612 126B26~1.EXE 99 PID 4612 wrote to memory of 784 4612 126B26~1.EXE 99 PID 784 wrote to memory of 2412 784 svchost.com 100 PID 784 wrote to memory of 2412 784 svchost.com 100 PID 784 wrote to memory of 2412 784 svchost.com 100 PID 2412 wrote to memory of 4940 2412 126B26~1.EXE 134 PID 2412 wrote to memory of 4940 2412 126B26~1.EXE 134 PID 2412 wrote to memory of 4940 2412 126B26~1.EXE 134 PID 4940 wrote to memory of 1972 4940 svchost.com 102 PID 4940 wrote to memory of 1972 4940 svchost.com 102 PID 4940 wrote to memory of 1972 4940 svchost.com 102 PID 1972 wrote to memory of 2616 1972 126B26~1.EXE 142 PID 1972 wrote to memory of 2616 1972 126B26~1.EXE 142 PID 1972 wrote to memory of 2616 1972 126B26~1.EXE 142 PID 2616 wrote to memory of 3956 2616 svchost.com 104 PID 2616 wrote to memory of 3956 2616 svchost.com 104 PID 2616 wrote to memory of 3956 2616 svchost.com 104 PID 3956 wrote to memory of 2476 3956 126B26~1.EXE 184
Processes
-
C:\Users\Admin\AppData\Local\Temp\126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe"C:\Users\Admin\AppData\Local\Temp\126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe"C:\Users\Admin\AppData\Local\Temp\126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe"3⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\126b26b3e1035b2185f44b02f2cb43552db3eb1f6dfd80721fa1595ae0b855fcN.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"23⤵
- Executes dropped EXE
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
PID:4492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE26⤵
- Executes dropped EXE
PID:4584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"27⤵
- Executes dropped EXE
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE28⤵
- Executes dropped EXE
PID:2732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"29⤵
- Executes dropped EXE
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE30⤵
- Executes dropped EXE
PID:1200 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"31⤵
- Executes dropped EXE
PID:320 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE32⤵
- Executes dropped EXE
PID:4928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"33⤵
- Executes dropped EXE
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE34⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"35⤵
- Executes dropped EXE
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"37⤵
- Executes dropped EXE
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE38⤵
- Executes dropped EXE
PID:116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"39⤵
- Executes dropped EXE
PID:732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"41⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
PID:2076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE44⤵
- Executes dropped EXE
PID:4004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"45⤵
- Executes dropped EXE
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE48⤵
- Executes dropped EXE
PID:4616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"53⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"55⤵
- Executes dropped EXE
PID:4912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE56⤵
- Executes dropped EXE
PID:2148 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"57⤵
- Executes dropped EXE
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE58⤵
- Executes dropped EXE
- Modifies registry class
PID:4752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE60⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"61⤵
- Executes dropped EXE
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE62⤵
- Executes dropped EXE
- Modifies registry class
PID:4488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"63⤵
- Executes dropped EXE
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"65⤵
- Drops file in Windows directory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE66⤵PID:5048
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"67⤵PID:3772
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE68⤵PID:224
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"69⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE70⤵
- Modifies registry class
PID:1760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"71⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE72⤵
- System Location Discovery: System Language Discovery
PID:100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"73⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE74⤵
- Checks computer location settings
PID:1764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"75⤵PID:4472
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE76⤵PID:1092
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"77⤵PID:4296
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE78⤵
- System Location Discovery: System Language Discovery
PID:3968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"79⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE80⤵
- Checks computer location settings
- Drops file in Windows directory
PID:1388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"81⤵
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE82⤵
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE84⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"85⤵PID:1364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE86⤵
- Checks computer location settings
- Modifies registry class
PID:2420 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"87⤵PID:3864
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE88⤵
- Modifies registry class
PID:4616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"89⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE90⤵
- Modifies registry class
PID:1580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"91⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE92⤵
- Drops file in Windows directory
PID:3152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"93⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE94⤵PID:988
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"95⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE96⤵PID:2416
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"97⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE98⤵
- Checks computer location settings
PID:4412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"99⤵
- Drops file in Windows directory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE100⤵
- Checks computer location settings
PID:3132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"101⤵PID:3468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE102⤵
- Drops file in Windows directory
PID:2476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"103⤵PID:2256
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE104⤵
- Checks computer location settings
- Modifies registry class
PID:1584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"105⤵PID:4824
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE106⤵
- Checks computer location settings
- Modifies registry class
PID:4860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"107⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE108⤵
- Checks computer location settings
PID:2452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"109⤵
- Drops file in Windows directory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE110⤵
- Modifies registry class
PID:1720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"111⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE112⤵PID:396
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"113⤵PID:4968
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE114⤵
- Checks computer location settings
PID:4556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"115⤵
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE116⤵PID:320
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"117⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE118⤵
- Checks computer location settings
PID:2188 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"119⤵
- Drops file in Windows directory
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE120⤵
- Modifies registry class
PID:2992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE"121⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\126B26~1.EXE122⤵PID:1204
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-