Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 04:28
Behavioral task
behavioral1
Sample
253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe
Resource
win10v2004-20241007-en
General
-
Target
253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe
-
Size
272KB
-
MD5
2447acad63ef16345beabd063b41e360
-
SHA1
4d3a3a7c723e15dcfd1f7ee01c6ce6b54dd341b6
-
SHA256
253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4
-
SHA512
ff4e18d826844d267678ce461aabe7bf567e2311089606ddd73afb8d9470a0e11dfe42cf06f1bb225521ab30ca693d7330b16c9ab9d1dfdae2f7b365a8a25d4e
-
SSDEEP
3072:sr85Ce9PhKtkbecpt6vIlCSMF0t+elnhP2rCRr85C:k9eTKKbJ6vIlMxe/+Ct9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000a000000023b95-4.dat family_neshta behavioral2/files/0x000a000000023b96-10.dat family_neshta behavioral2/memory/4744-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5040-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4264-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3804-38-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1960-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1320-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1936-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/224-62-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3488-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2472-75-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1672-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/512-84-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002034d-88.dat family_neshta behavioral2/files/0x0006000000020220-94.dat family_neshta behavioral2/files/0x0006000000020237-114.dat family_neshta behavioral2/files/0x0004000000020313-113.dat family_neshta behavioral2/files/0x0001000000020299-112.dat family_neshta behavioral2/files/0x0004000000020352-111.dat family_neshta behavioral2/files/0x00010000000202b1-110.dat family_neshta behavioral2/memory/760-115-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5076-126-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1904-127-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3024-131-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000021539-145.dat family_neshta behavioral2/files/0x0002000000020317-143.dat family_neshta behavioral2/memory/2176-146-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214e2-149.dat family_neshta behavioral2/files/0x00010000000214e4-166.dat family_neshta behavioral2/files/0x0001000000022f70-180.dat family_neshta behavioral2/files/0x0001000000022f72-177.dat family_neshta behavioral2/files/0x0001000000022f34-173.dat family_neshta behavioral2/files/0x0001000000022f71-172.dat family_neshta behavioral2/files/0x0001000000016855-196.dat family_neshta behavioral2/files/0x00010000000167c9-195.dat family_neshta behavioral2/files/0x00010000000167b0-193.dat family_neshta behavioral2/files/0x00010000000167cb-194.dat family_neshta behavioral2/files/0x0001000000016802-192.dat family_neshta behavioral2/files/0x0001000000022f33-170.dat family_neshta behavioral2/files/0x0001000000022f32-169.dat family_neshta behavioral2/memory/3944-182-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/972-216-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1616-223-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5068-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1856-241-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4720-251-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2180-258-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4544-259-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1020-268-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2216-269-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3880-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3764-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4688-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1416-285-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3860-292-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3440-293-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3652-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5112-301-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1320-308-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1936-309-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4764-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4676-317-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4592-319-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 253CB1~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 2340 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe 4744 svchost.com 5040 253CB1~1.EXE 4264 svchost.com 3804 253CB1~1.EXE 1960 svchost.com 1320 253CB1~1.EXE 1936 svchost.com 224 253CB1~1.EXE 3488 svchost.com 2472 253CB1~1.EXE 1672 svchost.com 512 253CB1~1.EXE 760 svchost.com 5076 253CB1~1.EXE 1904 svchost.com 3024 253CB1~1.EXE 2176 svchost.com 3944 253CB1~1.EXE 972 svchost.com 1616 253CB1~1.EXE 5068 svchost.com 1856 253CB1~1.EXE 4720 svchost.com 2180 253CB1~1.EXE 4544 svchost.com 1020 253CB1~1.EXE 2216 svchost.com 3880 253CB1~1.EXE 3764 svchost.com 4688 253CB1~1.EXE 1416 svchost.com 3860 253CB1~1.EXE 3440 svchost.com 3652 253CB1~1.EXE 5112 svchost.com 1320 253CB1~1.EXE 1936 svchost.com 4764 253CB1~1.EXE 4676 svchost.com 4592 253CB1~1.EXE 3152 svchost.com 1404 253CB1~1.EXE 4528 svchost.com 716 253CB1~1.EXE 4456 svchost.com 3468 253CB1~1.EXE 964 svchost.com 1260 253CB1~1.EXE 2300 svchost.com 552 253CB1~1.EXE 1680 svchost.com 3720 253CB1~1.EXE 4024 svchost.com 372 253CB1~1.EXE 3736 svchost.com 1432 253CB1~1.EXE 3872 svchost.com 1588 253CB1~1.EXE 1596 svchost.com 696 253CB1~1.EXE 3500 svchost.com 3248 253CB1~1.EXE 464 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaw.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 253CB1~1.EXE File opened for modification C:\Windows\svchost.com 253CB1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\svchost.com 253CB1~1.EXE File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\svchost.com 253CB1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\svchost.com 253CB1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 253CB1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe File opened for modification C:\Windows\svchost.com 253CB1~1.EXE File opened for modification C:\Windows\svchost.com 253CB1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 253CB1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 253CB1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 253CB1~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 253CB1~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 253CB1~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 253CB1~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3700 wrote to memory of 2340 3700 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe 82 PID 3700 wrote to memory of 2340 3700 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe 82 PID 3700 wrote to memory of 2340 3700 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe 82 PID 2340 wrote to memory of 4744 2340 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe 83 PID 2340 wrote to memory of 4744 2340 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe 83 PID 2340 wrote to memory of 4744 2340 253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe 83 PID 4744 wrote to memory of 5040 4744 svchost.com 84 PID 4744 wrote to memory of 5040 4744 svchost.com 84 PID 4744 wrote to memory of 5040 4744 svchost.com 84 PID 5040 wrote to memory of 4264 5040 253CB1~1.EXE 85 PID 5040 wrote to memory of 4264 5040 253CB1~1.EXE 85 PID 5040 wrote to memory of 4264 5040 253CB1~1.EXE 85 PID 4264 wrote to memory of 3804 4264 svchost.com 86 PID 4264 wrote to memory of 3804 4264 svchost.com 86 PID 4264 wrote to memory of 3804 4264 svchost.com 86 PID 3804 wrote to memory of 1960 3804 253CB1~1.EXE 87 PID 3804 wrote to memory of 1960 3804 253CB1~1.EXE 87 PID 3804 wrote to memory of 1960 3804 253CB1~1.EXE 87 PID 1960 wrote to memory of 1320 1960 svchost.com 118 PID 1960 wrote to memory of 1320 1960 svchost.com 118 PID 1960 wrote to memory of 1320 1960 svchost.com 118 PID 1320 wrote to memory of 1936 1320 253CB1~1.EXE 119 PID 1320 wrote to memory of 1936 1320 253CB1~1.EXE 119 PID 1320 wrote to memory of 1936 1320 253CB1~1.EXE 119 PID 1936 wrote to memory of 224 1936 svchost.com 90 PID 1936 wrote to memory of 224 1936 svchost.com 90 PID 1936 wrote to memory of 224 1936 svchost.com 90 PID 224 wrote to memory of 3488 224 253CB1~1.EXE 91 PID 224 wrote to memory of 3488 224 253CB1~1.EXE 91 PID 224 wrote to memory of 3488 224 253CB1~1.EXE 91 PID 3488 wrote to memory of 2472 3488 svchost.com 92 PID 3488 wrote to memory of 2472 3488 svchost.com 92 PID 3488 wrote to memory of 2472 3488 svchost.com 92 PID 2472 wrote to memory of 1672 2472 253CB1~1.EXE 93 PID 2472 wrote to memory of 1672 2472 253CB1~1.EXE 93 PID 2472 wrote to memory of 1672 2472 253CB1~1.EXE 93 PID 1672 wrote to memory of 512 1672 svchost.com 94 PID 1672 wrote to memory of 512 1672 svchost.com 94 PID 1672 wrote to memory of 512 1672 svchost.com 94 PID 512 wrote to memory of 760 512 253CB1~1.EXE 95 PID 512 wrote to memory of 760 512 253CB1~1.EXE 95 PID 512 wrote to memory of 760 512 253CB1~1.EXE 95 PID 760 wrote to memory of 5076 760 svchost.com 96 PID 760 wrote to memory of 5076 760 svchost.com 96 PID 760 wrote to memory of 5076 760 svchost.com 96 PID 5076 wrote to memory of 1904 5076 253CB1~1.EXE 97 PID 5076 wrote to memory of 1904 5076 253CB1~1.EXE 97 PID 5076 wrote to memory of 1904 5076 253CB1~1.EXE 97 PID 1904 wrote to memory of 3024 1904 svchost.com 98 PID 1904 wrote to memory of 3024 1904 svchost.com 98 PID 1904 wrote to memory of 3024 1904 svchost.com 98 PID 3024 wrote to memory of 2176 3024 253CB1~1.EXE 99 PID 3024 wrote to memory of 2176 3024 253CB1~1.EXE 99 PID 3024 wrote to memory of 2176 3024 253CB1~1.EXE 99 PID 2176 wrote to memory of 3944 2176 svchost.com 100 PID 2176 wrote to memory of 3944 2176 svchost.com 100 PID 2176 wrote to memory of 3944 2176 svchost.com 100 PID 3944 wrote to memory of 972 3944 253CB1~1.EXE 101 PID 3944 wrote to memory of 972 3944 253CB1~1.EXE 101 PID 3944 wrote to memory of 972 3944 253CB1~1.EXE 101 PID 972 wrote to memory of 1616 972 svchost.com 102 PID 972 wrote to memory of 1616 972 svchost.com 102 PID 972 wrote to memory of 1616 972 svchost.com 102 PID 1616 wrote to memory of 5068 1616 253CB1~1.EXE 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe"C:\Users\Admin\AppData\Local\Temp\253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\253cb105af7690b20b94893ac29fdfc0dfa718a1166be68c08820efce3aa84b4N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE8⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE14⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"23⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE24⤵
- Executes dropped EXE
- Modifies registry class
PID:1856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"25⤵
- Executes dropped EXE
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"27⤵
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
PID:1020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
PID:3880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"33⤵
- Executes dropped EXE
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"37⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
PID:1320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE40⤵
- Executes dropped EXE
PID:4764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"43⤵
- Executes dropped EXE
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
PID:1404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE48⤵
- Executes dropped EXE
- Modifies registry class
PID:3468 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"49⤵
- Executes dropped EXE
PID:964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE50⤵
- Executes dropped EXE
PID:1260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"51⤵
- Executes dropped EXE
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"53⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE54⤵
- Executes dropped EXE
- Modifies registry class
PID:3720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"55⤵
- Executes dropped EXE
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"57⤵
- Executes dropped EXE
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
PID:696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"65⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE66⤵
- Checks computer location settings
- Modifies registry class
PID:3504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"67⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE68⤵
- System Location Discovery: System Language Discovery
PID:4736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"69⤵PID:4144
-
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE70⤵
- Checks computer location settings
PID:4944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"71⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE72⤵
- Drops file in Windows directory
- Modifies registry class
PID:2996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"73⤵PID:4988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE74⤵
- Checks computer location settings
- Modifies registry class
PID:1400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"75⤵
- Drops file in Windows directory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE76⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"77⤵PID:3440
-
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE78⤵
- System Location Discovery: System Language Discovery
PID:1960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"79⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE80⤵
- Drops file in Windows directory
PID:3016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"81⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE82⤵
- Checks computer location settings
- Modifies registry class
PID:4484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"83⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE84⤵
- Drops file in Windows directory
PID:376 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"85⤵
- System Location Discovery: System Language Discovery
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE86⤵
- Drops file in Windows directory
- Modifies registry class
PID:1772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"87⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE88⤵
- Checks computer location settings
PID:380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"89⤵
- Drops file in Windows directory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE90⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"91⤵
- Drops file in Windows directory
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE92⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"93⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE94⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2176 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"95⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE96⤵
- Modifies registry class
PID:4032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"97⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE98⤵
- Checks computer location settings
- Modifies registry class
PID:4972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"99⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE100⤵PID:4276
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"101⤵
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE102⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"103⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE104⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"105⤵
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE106⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"107⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE108⤵
- Checks computer location settings
- Modifies registry class
PID:3040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"109⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE110⤵
- Drops file in Windows directory
- Modifies registry class
PID:2988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"111⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE112⤵
- System Location Discovery: System Language Discovery
PID:4944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"113⤵
- System Location Discovery: System Language Discovery
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE114⤵
- System Location Discovery: System Language Discovery
PID:3744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"115⤵
- System Location Discovery: System Language Discovery
PID:3084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE116⤵
- Checks computer location settings
PID:2656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"117⤵PID:4340
-
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE118⤵PID:2028
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"119⤵
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE120⤵PID:3160
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE"121⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\253CB1~1.EXE122⤵
- System Location Discovery: System Language Discovery
PID:3016
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-