Analysis
-
max time kernel
93s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2024 03:49
Behavioral task
behavioral1
Sample
ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe
Resource
win10v2004-20241007-en
General
-
Target
ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe
-
Size
160KB
-
MD5
ed94aca012ef6b6d1405be64a5c21b80
-
SHA1
49cfcf3cc8b14b5ac196043258c69b50f4ab7219
-
SHA256
ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70a
-
SHA512
068b92d9a6d17ed2e25a63346b6608967773f7fdbe4859e235d278c1a92a70724eb89b95db215594442dc57158681014483ae10d39924eebb231637436b99b84
-
SSDEEP
3072:sr85CgOgoku2tn8ZepItrsG4vEFyTS+LGyr85C:k9gOgoV2tn8oorROEFsS+LG69
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000b000000023b6e-4.dat family_neshta behavioral2/files/0x000a000000023b73-10.dat family_neshta behavioral2/memory/2516-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/532-20-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3556-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1172-39-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1432-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2036-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4752-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3248-63-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4072-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1156-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4068-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2156-87-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5104-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2304-92-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000020225-112.dat family_neshta behavioral2/files/0x0001000000020294-113.dat family_neshta behavioral2/files/0x0004000000020335-111.dat family_neshta behavioral2/memory/3528-119-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000600000002022d-127.dat family_neshta behavioral2/files/0x0004000000020309-126.dat family_neshta behavioral2/memory/4512-162-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3380-151-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3008-170-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/768-174-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/464-150-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3756-139-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2028-138-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000100000002028f-125.dat family_neshta behavioral2/files/0x0004000000020348-124.dat family_neshta behavioral2/files/0x00010000000202a7-123.dat family_neshta behavioral2/files/0x0006000000020212-110.dat family_neshta behavioral2/files/0x000600000002021e-109.dat family_neshta behavioral2/files/0x0006000000020216-108.dat family_neshta behavioral2/memory/1860-179-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3416-175-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4028-192-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4336-195-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/724-219-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2896-230-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1656-264-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3548-266-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3628-275-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4016-285-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4040-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4800-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5096-309-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4832-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4844-317-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4140-325-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2460-333-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4456-340-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3852-341-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3124-343-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3476-349-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2880-356-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2664-357-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1960-359-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/676-365-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/616-372-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2152-373-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3936-375-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1544-381-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation CE6676~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 4572 ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe 2516 svchost.com 532 CE6676~1.EXE 3556 svchost.com 1172 CE6676~1.EXE 1432 svchost.com 2036 CE6676~1.EXE 4752 svchost.com 3248 CE6676~1.EXE 4072 svchost.com 1156 CE6676~1.EXE 4068 svchost.com 2156 CE6676~1.EXE 5104 svchost.com 2304 CE6676~1.EXE 3528 svchost.com 2028 CE6676~1.EXE 3756 svchost.com 464 CE6676~1.EXE 3380 svchost.com 4512 CE6676~1.EXE 3008 svchost.com 768 CE6676~1.EXE 3416 svchost.com 1860 CE6676~1.EXE 4028 svchost.com 4336 CE6676~1.EXE 724 svchost.com 2896 CE6676~1.EXE 1656 svchost.com 3548 CE6676~1.EXE 3628 svchost.com 4016 CE6676~1.EXE 4040 svchost.com 4800 CE6676~1.EXE 5096 svchost.com 4832 CE6676~1.EXE 4844 svchost.com 4140 CE6676~1.EXE 2460 svchost.com 4456 CE6676~1.EXE 3852 svchost.com 3124 CE6676~1.EXE 3476 svchost.com 2880 CE6676~1.EXE 2664 svchost.com 1960 CE6676~1.EXE 676 svchost.com 616 CE6676~1.EXE 2152 svchost.com 3936 CE6676~1.EXE 1544 svchost.com 3520 CE6676~1.EXE 2844 svchost.com 4372 CE6676~1.EXE 3820 svchost.com 4332 CE6676~1.EXE 3704 svchost.com 2016 CE6676~1.EXE 884 svchost.com 3572 CE6676~1.EXE 4616 svchost.com 1360 CE6676~1.EXE 1604 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CE6676~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CE6676~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys CE6676~1.EXE File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CE6676~1.EXE File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CE6676~1.EXE File opened for modification C:\Windows\directx.sys CE6676~1.EXE File opened for modification C:\Windows\directx.sys CE6676~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CE6676~1.EXE File opened for modification C:\Windows\directx.sys CE6676~1.EXE File opened for modification C:\Windows\directx.sys CE6676~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys CE6676~1.EXE File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys CE6676~1.EXE File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\directx.sys CE6676~1.EXE File opened for modification C:\Windows\svchost.com CE6676~1.EXE File opened for modification C:\Windows\directx.sys CE6676~1.EXE File opened for modification C:\Windows\directx.sys CE6676~1.EXE File opened for modification C:\Windows\directx.sys CE6676~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CE6676~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings CE6676~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 212 wrote to memory of 4572 212 ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe 83 PID 212 wrote to memory of 4572 212 ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe 83 PID 212 wrote to memory of 4572 212 ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe 83 PID 4572 wrote to memory of 2516 4572 ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe 84 PID 4572 wrote to memory of 2516 4572 ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe 84 PID 4572 wrote to memory of 2516 4572 ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe 84 PID 2516 wrote to memory of 532 2516 svchost.com 85 PID 2516 wrote to memory of 532 2516 svchost.com 85 PID 2516 wrote to memory of 532 2516 svchost.com 85 PID 532 wrote to memory of 3556 532 CE6676~1.EXE 86 PID 532 wrote to memory of 3556 532 CE6676~1.EXE 86 PID 532 wrote to memory of 3556 532 CE6676~1.EXE 86 PID 3556 wrote to memory of 1172 3556 svchost.com 87 PID 3556 wrote to memory of 1172 3556 svchost.com 87 PID 3556 wrote to memory of 1172 3556 svchost.com 87 PID 1172 wrote to memory of 1432 1172 CE6676~1.EXE 88 PID 1172 wrote to memory of 1432 1172 CE6676~1.EXE 88 PID 1172 wrote to memory of 1432 1172 CE6676~1.EXE 88 PID 1432 wrote to memory of 2036 1432 svchost.com 89 PID 1432 wrote to memory of 2036 1432 svchost.com 89 PID 1432 wrote to memory of 2036 1432 svchost.com 89 PID 2036 wrote to memory of 4752 2036 CE6676~1.EXE 90 PID 2036 wrote to memory of 4752 2036 CE6676~1.EXE 90 PID 2036 wrote to memory of 4752 2036 CE6676~1.EXE 90 PID 4752 wrote to memory of 3248 4752 svchost.com 91 PID 4752 wrote to memory of 3248 4752 svchost.com 91 PID 4752 wrote to memory of 3248 4752 svchost.com 91 PID 3248 wrote to memory of 4072 3248 CE6676~1.EXE 92 PID 3248 wrote to memory of 4072 3248 CE6676~1.EXE 92 PID 3248 wrote to memory of 4072 3248 CE6676~1.EXE 92 PID 4072 wrote to memory of 1156 4072 svchost.com 93 PID 4072 wrote to memory of 1156 4072 svchost.com 93 PID 4072 wrote to memory of 1156 4072 svchost.com 93 PID 1156 wrote to memory of 4068 1156 CE6676~1.EXE 94 PID 1156 wrote to memory of 4068 1156 CE6676~1.EXE 94 PID 1156 wrote to memory of 4068 1156 CE6676~1.EXE 94 PID 4068 wrote to memory of 2156 4068 svchost.com 95 PID 4068 wrote to memory of 2156 4068 svchost.com 95 PID 4068 wrote to memory of 2156 4068 svchost.com 95 PID 2156 wrote to memory of 5104 2156 CE6676~1.EXE 158 PID 2156 wrote to memory of 5104 2156 CE6676~1.EXE 158 PID 2156 wrote to memory of 5104 2156 CE6676~1.EXE 158 PID 5104 wrote to memory of 2304 5104 svchost.com 97 PID 5104 wrote to memory of 2304 5104 svchost.com 97 PID 5104 wrote to memory of 2304 5104 svchost.com 97 PID 2304 wrote to memory of 3528 2304 CE6676~1.EXE 196 PID 2304 wrote to memory of 3528 2304 CE6676~1.EXE 196 PID 2304 wrote to memory of 3528 2304 CE6676~1.EXE 196 PID 3528 wrote to memory of 2028 3528 svchost.com 99 PID 3528 wrote to memory of 2028 3528 svchost.com 99 PID 3528 wrote to memory of 2028 3528 svchost.com 99 PID 2028 wrote to memory of 3756 2028 CE6676~1.EXE 100 PID 2028 wrote to memory of 3756 2028 CE6676~1.EXE 100 PID 2028 wrote to memory of 3756 2028 CE6676~1.EXE 100 PID 3756 wrote to memory of 464 3756 svchost.com 101 PID 3756 wrote to memory of 464 3756 svchost.com 101 PID 3756 wrote to memory of 464 3756 svchost.com 101 PID 464 wrote to memory of 3380 464 CE6676~1.EXE 102 PID 464 wrote to memory of 3380 464 CE6676~1.EXE 102 PID 464 wrote to memory of 3380 464 CE6676~1.EXE 102 PID 3380 wrote to memory of 4512 3380 svchost.com 170 PID 3380 wrote to memory of 4512 3380 svchost.com 170 PID 3380 wrote to memory of 4512 3380 svchost.com 170 PID 4512 wrote to memory of 3008 4512 CE6676~1.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe"C:\Users\Admin\AppData\Local\Temp\ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\3582-490\ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\ce667665bc9e83098c06cc2f545a22f5df45c2b596561e7113a60610475fb70aN.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4752 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE12⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"19⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"21⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"23⤵
- Executes dropped EXE
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE24⤵
- Executes dropped EXE
PID:768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"25⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE26⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"27⤵
- Executes dropped EXE
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
PID:4336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"29⤵
- Executes dropped EXE
PID:724 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE30⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"31⤵
- Executes dropped EXE
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE32⤵
- Executes dropped EXE
PID:3548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"33⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE34⤵
- Executes dropped EXE
PID:4016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"35⤵
- Executes dropped EXE
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE36⤵
- Executes dropped EXE
- Modifies registry class
PID:4800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"37⤵
- Executes dropped EXE
PID:5096 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
PID:4140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"41⤵
- Executes dropped EXE
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE42⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"43⤵
- Executes dropped EXE
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE44⤵
- Executes dropped EXE
PID:3124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"45⤵
- Executes dropped EXE
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE46⤵
- Executes dropped EXE
- Modifies registry class
PID:2880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"49⤵
- Executes dropped EXE
PID:676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"51⤵
- Executes dropped EXE
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE52⤵
- Executes dropped EXE
- Modifies registry class
PID:3936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"53⤵
- Executes dropped EXE
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE54⤵
- Executes dropped EXE
- Modifies registry class
PID:3520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"55⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE56⤵
- Executes dropped EXE
PID:4372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"57⤵
- Executes dropped EXE
PID:3820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE58⤵
- Executes dropped EXE
- Modifies registry class
PID:4332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"59⤵
- Executes dropped EXE
PID:3704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE60⤵
- Executes dropped EXE
PID:2016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"61⤵
- Executes dropped EXE
PID:884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE62⤵
- Executes dropped EXE
- Modifies registry class
PID:3572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1360 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"65⤵
- Executes dropped EXE
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE66⤵
- Checks computer location settings
PID:1784 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE68⤵PID:3548
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"69⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE70⤵
- Drops file in Windows directory
PID:2368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"71⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE72⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"73⤵PID:3388
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE74⤵PID:2756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE76⤵
- Checks computer location settings
- Modifies registry class
PID:1868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"77⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE78⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"79⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE80⤵
- Checks computer location settings
PID:3716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"81⤵PID:424
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE82⤵
- Modifies registry class
PID:3288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"83⤵
- Drops file in Windows directory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE84⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"85⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE86⤵PID:5044
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"87⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE88⤵PID:1936
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"89⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE90⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"91⤵
- System Location Discovery: System Language Discovery
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE92⤵PID:624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"93⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE94⤵PID:1796
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"95⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE96⤵
- Modifies registry class
PID:3556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"97⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE98⤵
- Checks computer location settings
- Modifies registry class
PID:1692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE100⤵
- Checks computer location settings
- Modifies registry class
PID:408 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"101⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE102⤵
- System Location Discovery: System Language Discovery
PID:3112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"103⤵
- System Location Discovery: System Language Discovery
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE104⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"105⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE106⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"107⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE108⤵
- Checks computer location settings
PID:3528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"109⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE110⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"111⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE112⤵
- Checks computer location settings
- Modifies registry class
PID:2688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"113⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE114⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"115⤵
- Drops file in Windows directory
PID:424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE116⤵
- Checks computer location settings
PID:5084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE118⤵PID:1856
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"119⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE120⤵
- System Location Discovery: System Language Discovery
PID:1880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE"121⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CE6676~1.EXE122⤵
- Checks computer location settings
- Modifies registry class
PID:3808
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-