Analysis
-
max time kernel
36s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 03:00
Behavioral task
behavioral1
Sample
b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe
Resource
win10v2004-20241007-en
General
-
Target
b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe
-
Size
209KB
-
MD5
335927026a466be229fc54696779c150
-
SHA1
eae6941995865cb506f0c93f87ae8acbc9204812
-
SHA256
b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8c
-
SHA512
250a5ab8217e8246312a1598cc22974022b3acd9b8e1c40212b9f0b894f1bd9ecbda3b95df3295e5f19549f657278314765269da6c414b107b78b6d13023b525
-
SSDEEP
3072:sr85CvzzNZYjXkZYsNUIcFMtqWJkZYsNUIcFMtqWHr85C:k94SXUNFzWoXUNFzWL9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0007000000023c94-4.dat family_neshta behavioral2/files/0x0007000000023c95-10.dat family_neshta behavioral2/memory/4552-18-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2640-22-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3112-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2904-41-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3104-42-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/972-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3284-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1336-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3568-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5108-77-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4636-78-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2412-89-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020358-91.dat family_neshta behavioral2/files/0x0008000000020229-94.dat family_neshta behavioral2/memory/2080-114-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1348-125-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3052-126-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1160-136-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4784-139-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2288-148-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214ef-159.dat family_neshta behavioral2/files/0x00010000000214ee-164.dat family_neshta behavioral2/memory/1144-166-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f2d-170.dat family_neshta behavioral2/files/0x0001000000016857-196.dat family_neshta behavioral2/files/0x00010000000167cb-195.dat family_neshta behavioral2/files/0x00010000000167cd-194.dat family_neshta behavioral2/memory/3524-203-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167b2-187.dat family_neshta behavioral2/files/0x000100000001dbbc-210.dat family_neshta behavioral2/files/0x0001000000016804-186.dat family_neshta behavioral2/files/0x0001000000022e86-225.dat family_neshta behavioral2/files/0x0001000000016919-222.dat family_neshta behavioral2/files/0x0001000000022f70-178.dat family_neshta behavioral2/files/0x000200000000072b-230.dat family_neshta behavioral2/memory/1208-228-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5048-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3384-250-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/444-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4368-262-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1648-269-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1976-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4012-274-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1200-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4520-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/396-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/208-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1972-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3496-298-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4884-304-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3132-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1928-312-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4480-319-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4636-320-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4472-322-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2808-328-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4072-335-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4824-336-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2080-338-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1948-344-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2324-351-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4000-352-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation B766E3~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 1324 b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe 4552 svchost.com 2640 B766E3~1.EXE 3112 svchost.com 2904 B766E3~1.EXE 3104 svchost.com 972 B766E3~1.EXE 3284 svchost.com 1336 B766E3~1.EXE 3568 svchost.com 5108 B766E3~1.EXE 4636 svchost.com 2412 B766E3~1.EXE 2080 svchost.com 1348 B766E3~1.EXE 3052 svchost.com 1160 B766E3~1.EXE 4784 svchost.com 2288 B766E3~1.EXE 1144 svchost.com 3524 B766E3~1.EXE 1208 svchost.com 5048 B766E3~1.EXE 3384 svchost.com 444 B766E3~1.EXE 4368 svchost.com 1648 B766E3~1.EXE 1976 svchost.com 4012 B766E3~1.EXE 1200 svchost.com 4520 B766E3~1.EXE 396 svchost.com 208 B766E3~1.EXE 1972 svchost.com 3496 B766E3~1.EXE 4884 svchost.com 3132 B766E3~1.EXE 1928 svchost.com 4480 B766E3~1.EXE 4636 svchost.com 4472 B766E3~1.EXE 2808 svchost.com 4072 B766E3~1.EXE 4824 svchost.com 2080 B766E3~1.EXE 1948 svchost.com 2324 B766E3~1.EXE 4000 svchost.com 4608 B766E3~1.EXE 2188 svchost.com 4624 B766E3~1.EXE 1504 svchost.com 3116 B766E3~1.EXE 2340 svchost.com 3180 B766E3~1.EXE 3780 svchost.com 3108 B766E3~1.EXE 3988 svchost.com 4912 B766E3~1.EXE 3948 svchost.com 1636 B766E3~1.EXE 1704 svchost.com 540 B766E3~1.EXE 4388 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys B766E3~1.EXE File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\directx.sys B766E3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\directx.sys b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\directx.sys B766E3~1.EXE File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B766E3~1.EXE File opened for modification C:\Windows\directx.sys B766E3~1.EXE File opened for modification C:\Windows\directx.sys B766E3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\directx.sys B766E3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\directx.sys B766E3~1.EXE File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B766E3~1.EXE File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\directx.sys B766E3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B766E3~1.EXE File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys B766E3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys B766E3~1.EXE File opened for modification C:\Windows\svchost.com B766E3~1.EXE File opened for modification C:\Windows\directx.sys B766E3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B766E3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings B766E3~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2524 wrote to memory of 1324 2524 b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe 83 PID 2524 wrote to memory of 1324 2524 b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe 83 PID 2524 wrote to memory of 1324 2524 b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe 83 PID 1324 wrote to memory of 4552 1324 b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe 84 PID 1324 wrote to memory of 4552 1324 b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe 84 PID 1324 wrote to memory of 4552 1324 b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe 84 PID 4552 wrote to memory of 2640 4552 svchost.com 85 PID 4552 wrote to memory of 2640 4552 svchost.com 85 PID 4552 wrote to memory of 2640 4552 svchost.com 85 PID 2640 wrote to memory of 3112 2640 B766E3~1.EXE 86 PID 2640 wrote to memory of 3112 2640 B766E3~1.EXE 86 PID 2640 wrote to memory of 3112 2640 B766E3~1.EXE 86 PID 3112 wrote to memory of 2904 3112 svchost.com 87 PID 3112 wrote to memory of 2904 3112 svchost.com 87 PID 3112 wrote to memory of 2904 3112 svchost.com 87 PID 2904 wrote to memory of 3104 2904 B766E3~1.EXE 88 PID 2904 wrote to memory of 3104 2904 B766E3~1.EXE 88 PID 2904 wrote to memory of 3104 2904 B766E3~1.EXE 88 PID 3104 wrote to memory of 972 3104 svchost.com 89 PID 3104 wrote to memory of 972 3104 svchost.com 89 PID 3104 wrote to memory of 972 3104 svchost.com 89 PID 972 wrote to memory of 3284 972 B766E3~1.EXE 90 PID 972 wrote to memory of 3284 972 B766E3~1.EXE 90 PID 972 wrote to memory of 3284 972 B766E3~1.EXE 90 PID 3284 wrote to memory of 1336 3284 svchost.com 91 PID 3284 wrote to memory of 1336 3284 svchost.com 91 PID 3284 wrote to memory of 1336 3284 svchost.com 91 PID 1336 wrote to memory of 3568 1336 B766E3~1.EXE 92 PID 1336 wrote to memory of 3568 1336 B766E3~1.EXE 92 PID 1336 wrote to memory of 3568 1336 B766E3~1.EXE 92 PID 3568 wrote to memory of 5108 3568 svchost.com 160 PID 3568 wrote to memory of 5108 3568 svchost.com 160 PID 3568 wrote to memory of 5108 3568 svchost.com 160 PID 5108 wrote to memory of 4636 5108 B766E3~1.EXE 122 PID 5108 wrote to memory of 4636 5108 B766E3~1.EXE 122 PID 5108 wrote to memory of 4636 5108 B766E3~1.EXE 122 PID 4636 wrote to memory of 2412 4636 svchost.com 95 PID 4636 wrote to memory of 2412 4636 svchost.com 95 PID 4636 wrote to memory of 2412 4636 svchost.com 95 PID 2412 wrote to memory of 2080 2412 B766E3~1.EXE 127 PID 2412 wrote to memory of 2080 2412 B766E3~1.EXE 127 PID 2412 wrote to memory of 2080 2412 B766E3~1.EXE 127 PID 2080 wrote to memory of 1348 2080 svchost.com 166 PID 2080 wrote to memory of 1348 2080 svchost.com 166 PID 2080 wrote to memory of 1348 2080 svchost.com 166 PID 1348 wrote to memory of 3052 1348 B766E3~1.EXE 213 PID 1348 wrote to memory of 3052 1348 B766E3~1.EXE 213 PID 1348 wrote to memory of 3052 1348 B766E3~1.EXE 213 PID 3052 wrote to memory of 1160 3052 svchost.com 99 PID 3052 wrote to memory of 1160 3052 svchost.com 99 PID 3052 wrote to memory of 1160 3052 svchost.com 99 PID 1160 wrote to memory of 4784 1160 B766E3~1.EXE 100 PID 1160 wrote to memory of 4784 1160 B766E3~1.EXE 100 PID 1160 wrote to memory of 4784 1160 B766E3~1.EXE 100 PID 4784 wrote to memory of 2288 4784 svchost.com 214 PID 4784 wrote to memory of 2288 4784 svchost.com 214 PID 4784 wrote to memory of 2288 4784 svchost.com 214 PID 2288 wrote to memory of 1144 2288 B766E3~1.EXE 102 PID 2288 wrote to memory of 1144 2288 B766E3~1.EXE 102 PID 2288 wrote to memory of 1144 2288 B766E3~1.EXE 102 PID 1144 wrote to memory of 3524 1144 svchost.com 103 PID 1144 wrote to memory of 3524 1144 svchost.com 103 PID 1144 wrote to memory of 3524 1144 svchost.com 103 PID 3524 wrote to memory of 1208 3524 B766E3~1.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe"C:\Users\Admin\AppData\Local\Temp\b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\b766e3331690af7804f1f875c7479f559d24fc3be0ecf5de6fbb758bf4730d8cN.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3568 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE12⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"19⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"23⤵
- Executes dropped EXE
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE24⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:5048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"25⤵
- Executes dropped EXE
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE26⤵
- Executes dropped EXE
PID:444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"27⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE28⤵
- Executes dropped EXE
- Modifies registry class
PID:1648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"29⤵
- Executes dropped EXE
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
PID:4012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"31⤵
- Executes dropped EXE
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE34⤵
- Executes dropped EXE
PID:208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"35⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE36⤵
- Executes dropped EXE
PID:3496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE38⤵
- Executes dropped EXE
- Modifies registry class
PID:3132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"39⤵
- Executes dropped EXE
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"41⤵
- Executes dropped EXE
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE44⤵
- Executes dropped EXE
PID:4072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"45⤵
- Executes dropped EXE
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
PID:2080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"47⤵
- Executes dropped EXE
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"49⤵
- Executes dropped EXE
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"51⤵
- Executes dropped EXE
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
PID:4624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"53⤵
- Executes dropped EXE
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"55⤵
- Executes dropped EXE
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE56⤵
- Executes dropped EXE
- Modifies registry class
PID:3180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE58⤵
- Executes dropped EXE
- Modifies registry class
PID:3108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"61⤵
- Executes dropped EXE
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"63⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE64⤵
- Executes dropped EXE
PID:540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"65⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE66⤵
- Checks computer location settings
PID:772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"67⤵
- Drops file in Windows directory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE68⤵PID:1452
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"69⤵
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE70⤵
- Checks computer location settings
- Modifies registry class
PID:2416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"71⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE72⤵
- Drops file in Windows directory
PID:3992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"73⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE74⤵
- Checks computer location settings
PID:4464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"75⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE76⤵
- Checks computer location settings
PID:2652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"77⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE78⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"79⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE80⤵
- Modifies registry class
PID:2668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"81⤵
- System Location Discovery: System Language Discovery
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE82⤵
- Modifies registry class
PID:4936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"83⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE84⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"85⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE86⤵PID:5020
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"87⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE88⤵
- Checks computer location settings
PID:3552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"89⤵
- Drops file in Windows directory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE90⤵PID:472
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"91⤵
- Drops file in Windows directory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE92⤵
- Checks computer location settings
PID:4048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"93⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE94⤵
- Modifies registry class
PID:3096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"95⤵PID:4612
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE96⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"97⤵
- System Location Discovery: System Language Discovery
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE98⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4312 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE100⤵
- Modifies registry class
PID:1608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"101⤵PID:60
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE102⤵
- Modifies registry class
PID:2432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"103⤵PID:4880
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE104⤵PID:4400
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"105⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE106⤵
- Modifies registry class
PID:4496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"107⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE108⤵
- Drops file in Windows directory
PID:4688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"109⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE110⤵
- Modifies registry class
PID:2024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"111⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE112⤵PID:1908
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"113⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE114⤵
- Drops file in Windows directory
- Modifies registry class
PID:2448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"115⤵
- System Location Discovery: System Language Discovery
PID:536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE116⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"117⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE118⤵
- Drops file in Windows directory
- Modifies registry class
PID:656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"119⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE120⤵PID:2824
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE"121⤵
- Drops file in Windows directory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\B766E3~1.EXE122⤵
- System Location Discovery: System Language Discovery
PID:5060
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-