Analysis
-
max time kernel
91s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-11-2024 03:47
Behavioral task
behavioral1
Sample
eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe
Resource
win10v2004-20241007-en
General
-
Target
eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe
-
Size
265KB
-
MD5
929bc96cc8deb8a5637e2a8bfa1e30f0
-
SHA1
7f2a6af568cc7b067554444e1708c5081a8fc664
-
SHA256
eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbd
-
SHA512
17e2e116d9d0724756322673818338ad4f5fece1c03c8e79174b3ce4aa987b8d436e858022f94c9d6d6110b3e0e7ba57f017f55bfb1ffe73d260dab77f3eafd1
-
SSDEEP
3072:sr85CVLpp4bVWWwokzaLS+z9R4DJQPk4VsLwJ1JkxMqXyryr85Cxr85C:k9JOw/OLSvY9sLwfTqXj9N9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000a000000023b37-4.dat family_neshta behavioral2/files/0x000a000000023b38-10.dat family_neshta behavioral2/memory/316-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/648-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/844-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4592-38-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3712-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4484-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4716-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2604-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020348-65.dat family_neshta behavioral2/files/0x0006000000020223-72.dat family_neshta behavioral2/files/0x000600000002021b-71.dat family_neshta behavioral2/files/0x0007000000020283-69.dat family_neshta behavioral2/files/0x000400000002033b-79.dat family_neshta behavioral2/memory/4564-86-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/940-96-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2988-98-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/116-110-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000021534-115.dat family_neshta behavioral2/files/0x0002000000020312-114.dat family_neshta behavioral2/files/0x00010000000214e1-123.dat family_neshta behavioral2/files/0x00010000000214e0-120.dat family_neshta behavioral2/files/0x0001000000022f41-126.dat family_neshta behavioral2/files/0x0001000000022f80-134.dat family_neshta behavioral2/files/0x00010000000214df-119.dat family_neshta behavioral2/files/0x000100000001dbca-151.dat family_neshta behavioral2/files/0x0001000000022e7a-164.dat family_neshta behavioral2/files/0x0001000000016912-162.dat family_neshta behavioral2/files/0x000200000000072b-168.dat family_neshta behavioral2/memory/4544-182-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5104-195-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2736-199-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4692-203-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000e00000001f3b9-217.dat family_neshta behavioral2/files/0x000300000001e8bb-224.dat family_neshta behavioral2/files/0x000300000001e86a-223.dat family_neshta behavioral2/memory/3124-225-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5088-232-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000b00000001e7fa-221.dat family_neshta behavioral2/files/0x000b00000001edf9-220.dat family_neshta behavioral2/files/0x000500000001e8b4-219.dat family_neshta behavioral2/files/0x000b00000001e610-218.dat family_neshta behavioral2/files/0x000500000001e6a9-216.dat family_neshta behavioral2/files/0x000600000001db5f-213.dat family_neshta behavioral2/files/0x00020000000215d2-212.dat family_neshta behavioral2/memory/3272-233-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4572-240-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4788-241-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4800-243-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3636-249-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4072-256-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3928-257-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4328-259-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4932-265-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1032-267-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1164-273-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1976-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3388-281-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3120-283-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4520-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2228-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4808-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2712-304-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation EB1C2C~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 4684 eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe 316 svchost.com 648 EB1C2C~1.EXE 844 svchost.com 4592 EB1C2C~1.EXE 3712 svchost.com 4484 EB1C2C~1.EXE 4716 svchost.com 2604 EB1C2C~1.EXE 4564 svchost.com 940 EB1C2C~1.EXE 2988 svchost.com 116 EB1C2C~1.EXE 4544 svchost.com 5104 EB1C2C~1.EXE 2736 svchost.com 4692 EB1C2C~1.EXE 3124 svchost.com 5088 EB1C2C~1.EXE 3272 svchost.com 4572 EB1C2C~1.EXE 4788 svchost.com 4800 EB1C2C~1.EXE 3636 svchost.com 4072 EB1C2C~1.EXE 3928 svchost.com 4328 EB1C2C~1.EXE 4932 svchost.com 1032 EB1C2C~1.EXE 1164 svchost.com 1976 EB1C2C~1.EXE 3388 svchost.com 3120 EB1C2C~1.EXE 4520 svchost.com 2228 EB1C2C~1.EXE 4808 svchost.com 2712 EB1C2C~1.EXE 2260 svchost.com 2604 EB1C2C~1.EXE 4004 svchost.com 4896 EB1C2C~1.EXE 2160 svchost.com 3772 EB1C2C~1.EXE 3036 svchost.com 3424 EB1C2C~1.EXE 3672 svchost.com 2752 EB1C2C~1.EXE 2016 svchost.com 2184 EB1C2C~1.EXE 524 svchost.com 1524 EB1C2C~1.EXE 1696 svchost.com 1340 EB1C2C~1.EXE 1560 svchost.com 1228 EB1C2C~1.EXE 2696 svchost.com 2632 EB1C2C~1.EXE 2740 svchost.com 2640 EB1C2C~1.EXE 4184 svchost.com 4080 EB1C2C~1.EXE 1688 svchost.com 2372 EB1C2C~1.EXE 4728 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys EB1C2C~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE File opened for modification C:\Windows\svchost.com EB1C2C~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EB1C2C~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings EB1C2C~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3668 wrote to memory of 4684 3668 eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe 81 PID 3668 wrote to memory of 4684 3668 eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe 81 PID 3668 wrote to memory of 4684 3668 eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe 81 PID 4684 wrote to memory of 316 4684 eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe 82 PID 4684 wrote to memory of 316 4684 eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe 82 PID 4684 wrote to memory of 316 4684 eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe 82 PID 316 wrote to memory of 648 316 svchost.com 83 PID 316 wrote to memory of 648 316 svchost.com 83 PID 316 wrote to memory of 648 316 svchost.com 83 PID 648 wrote to memory of 844 648 EB1C2C~1.EXE 84 PID 648 wrote to memory of 844 648 EB1C2C~1.EXE 84 PID 648 wrote to memory of 844 648 EB1C2C~1.EXE 84 PID 844 wrote to memory of 4592 844 svchost.com 85 PID 844 wrote to memory of 4592 844 svchost.com 85 PID 844 wrote to memory of 4592 844 svchost.com 85 PID 4592 wrote to memory of 3712 4592 EB1C2C~1.EXE 86 PID 4592 wrote to memory of 3712 4592 EB1C2C~1.EXE 86 PID 4592 wrote to memory of 3712 4592 EB1C2C~1.EXE 86 PID 3712 wrote to memory of 4484 3712 svchost.com 87 PID 3712 wrote to memory of 4484 3712 svchost.com 87 PID 3712 wrote to memory of 4484 3712 svchost.com 87 PID 4484 wrote to memory of 4716 4484 EB1C2C~1.EXE 88 PID 4484 wrote to memory of 4716 4484 EB1C2C~1.EXE 88 PID 4484 wrote to memory of 4716 4484 EB1C2C~1.EXE 88 PID 4716 wrote to memory of 2604 4716 svchost.com 119 PID 4716 wrote to memory of 2604 4716 svchost.com 119 PID 4716 wrote to memory of 2604 4716 svchost.com 119 PID 2604 wrote to memory of 4564 2604 EB1C2C~1.EXE 90 PID 2604 wrote to memory of 4564 2604 EB1C2C~1.EXE 90 PID 2604 wrote to memory of 4564 2604 EB1C2C~1.EXE 90 PID 4564 wrote to memory of 940 4564 svchost.com 91 PID 4564 wrote to memory of 940 4564 svchost.com 91 PID 4564 wrote to memory of 940 4564 svchost.com 91 PID 940 wrote to memory of 2988 940 EB1C2C~1.EXE 92 PID 940 wrote to memory of 2988 940 EB1C2C~1.EXE 92 PID 940 wrote to memory of 2988 940 EB1C2C~1.EXE 92 PID 2988 wrote to memory of 116 2988 svchost.com 93 PID 2988 wrote to memory of 116 2988 svchost.com 93 PID 2988 wrote to memory of 116 2988 svchost.com 93 PID 116 wrote to memory of 4544 116 EB1C2C~1.EXE 94 PID 116 wrote to memory of 4544 116 EB1C2C~1.EXE 94 PID 116 wrote to memory of 4544 116 EB1C2C~1.EXE 94 PID 4544 wrote to memory of 5104 4544 svchost.com 95 PID 4544 wrote to memory of 5104 4544 svchost.com 95 PID 4544 wrote to memory of 5104 4544 svchost.com 95 PID 5104 wrote to memory of 2736 5104 EB1C2C~1.EXE 96 PID 5104 wrote to memory of 2736 5104 EB1C2C~1.EXE 96 PID 5104 wrote to memory of 2736 5104 EB1C2C~1.EXE 96 PID 2736 wrote to memory of 4692 2736 svchost.com 97 PID 2736 wrote to memory of 4692 2736 svchost.com 97 PID 2736 wrote to memory of 4692 2736 svchost.com 97 PID 4692 wrote to memory of 3124 4692 EB1C2C~1.EXE 98 PID 4692 wrote to memory of 3124 4692 EB1C2C~1.EXE 98 PID 4692 wrote to memory of 3124 4692 EB1C2C~1.EXE 98 PID 3124 wrote to memory of 5088 3124 svchost.com 99 PID 3124 wrote to memory of 5088 3124 svchost.com 99 PID 3124 wrote to memory of 5088 3124 svchost.com 99 PID 5088 wrote to memory of 3272 5088 EB1C2C~1.EXE 100 PID 5088 wrote to memory of 3272 5088 EB1C2C~1.EXE 100 PID 5088 wrote to memory of 3272 5088 EB1C2C~1.EXE 100 PID 3272 wrote to memory of 4572 3272 svchost.com 101 PID 3272 wrote to memory of 4572 3272 svchost.com 101 PID 3272 wrote to memory of 4572 3272 svchost.com 101 PID 4572 wrote to memory of 4788 4572 EB1C2C~1.EXE 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe"C:\Users\Admin\AppData\Local\Temp\eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\eb1c2cd4e28ee72651f2c9d76cdf18dc4c3e55efa97d921b36909b89df1f1cbdN.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"21⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"25⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4328 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"29⤵
- Executes dropped EXE
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE30⤵
- Executes dropped EXE
PID:1032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"31⤵
- Executes dropped EXE
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
PID:1976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"33⤵
- Executes dropped EXE
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE34⤵
- Executes dropped EXE
PID:3120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"35⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4808 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
PID:2712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE40⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"41⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE42⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"43⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE44⤵
- Executes dropped EXE
- Modifies registry class
PID:3772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"45⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE46⤵
- Executes dropped EXE
- Modifies registry class
PID:3424 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"47⤵
- Executes dropped EXE
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE48⤵
- Executes dropped EXE
- Modifies registry class
PID:2752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"49⤵
- Executes dropped EXE
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"51⤵
- Executes dropped EXE
PID:524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE52⤵
- Executes dropped EXE
PID:1524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"53⤵
- Executes dropped EXE
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"55⤵
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
PID:1228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"57⤵
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE58⤵
- Executes dropped EXE
PID:2632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"59⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"61⤵
- Executes dropped EXE
PID:4184 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE64⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE66⤵
- Checks computer location settings
PID:4764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"67⤵PID:5084
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE68⤵PID:1280
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"69⤵
- Drops file in Windows directory
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE70⤵PID:3364
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"71⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE72⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2244 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"73⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE74⤵
- Modifies registry class
PID:4264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"75⤵
- Drops file in Windows directory
PID:3416 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE76⤵PID:2324
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"77⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE78⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"79⤵
- Drops file in Windows directory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE80⤵
- Checks computer location settings
- Modifies registry class
PID:2260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"81⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE82⤵
- Drops file in Windows directory
- Modifies registry class
PID:4004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"83⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE84⤵
- Drops file in Windows directory
- Modifies registry class
PID:244 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"85⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE86⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"87⤵PID:4696
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE88⤵
- Checks computer location settings
- Modifies registry class
PID:1816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"89⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE90⤵
- Checks computer location settings
PID:2820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"91⤵
- System Location Discovery: System Language Discovery
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE92⤵
- Modifies registry class
PID:1896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"93⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE94⤵
- Modifies registry class
PID:2612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"95⤵PID:1292
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE96⤵
- Checks computer location settings
PID:4076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"97⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE98⤵PID:4528
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"99⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE100⤵
- Drops file in Windows directory
- Modifies registry class
PID:2432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"101⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE102⤵
- Modifies registry class
PID:4692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"103⤵
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE104⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"105⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE106⤵
- Drops file in Windows directory
- Modifies registry class
PID:4756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"107⤵
- System Location Discovery: System Language Discovery
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE108⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"109⤵
- Drops file in Windows directory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE110⤵
- Drops file in Windows directory
PID:4728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE112⤵PID:3392
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"113⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE114⤵PID:960
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"115⤵PID:924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE116⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:3768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE118⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"119⤵
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE120⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE"121⤵PID:4964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\EB1C2C~1.EXE122⤵PID:1628
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-