Analysis
-
max time kernel
104s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 20:34
Behavioral task
behavioral1
Sample
2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe
Resource
win10v2004-20241007-en
General
-
Target
2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe
-
Size
230KB
-
MD5
35ae5712554b07254555a34f4fc456c5
-
SHA1
3be7f2f18ce572890097f42885c33122954980df
-
SHA256
2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499
-
SHA512
6360131a8e995c9f566bbe3455c5f0816df39595dffef4a56d0ed4e2679e78940e49ff24ea1e4a5d7c0f723103e00e0a1c3b084b88e47b8154bd04f13cca2c91
-
SSDEEP
3072:sr85C5xk+WI0opiKyD/IOSfS0GJKqNtmxmAPxhlQeOfjR2cVsr85C:k95xk7ooBo1G7wmApQeON2cVk9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000a000000023b73-4.dat family_neshta behavioral2/files/0x000a000000023b74-10.dat family_neshta behavioral2/memory/228-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3092-20-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4848-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3308-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1392-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1104-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3572-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2864-63-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2628-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2508-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000600000002021b-80.dat family_neshta behavioral2/files/0x000400000002033a-88.dat family_neshta behavioral2/files/0x0001000000020299-91.dat family_neshta behavioral2/memory/5048-105-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020232-101.dat family_neshta behavioral2/files/0x000400000002030e-100.dat family_neshta behavioral2/files/0x0001000000020294-99.dat family_neshta behavioral2/memory/2180-94-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000100000002022a-90.dat family_neshta behavioral2/files/0x0006000000020217-84.dat family_neshta behavioral2/memory/4844-113-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4352-124-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4632-125-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1844-129-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/808-150-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214e0-153.dat family_neshta behavioral2/files/0x0001000000022f40-156.dat family_neshta behavioral2/files/0x00010000000214df-152.dat family_neshta behavioral2/files/0x0001000000022f7e-179.dat family_neshta behavioral2/files/0x00010000000167ab-184.dat family_neshta behavioral2/files/0x00010000000167c6-186.dat family_neshta behavioral2/files/0x0001000000016850-190.dat family_neshta behavioral2/files/0x00010000000167fd-183.dat family_neshta behavioral2/files/0x0001000000022f80-178.dat family_neshta behavioral2/files/0x000100000001dbca-200.dat family_neshta behavioral2/files/0x000100000001dbd3-202.dat family_neshta behavioral2/files/0x0001000000022f3f-177.dat family_neshta behavioral2/memory/916-180-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000016914-210.dat family_neshta behavioral2/memory/3972-226-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1680-227-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3384-234-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3928-219-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f42-176.dat family_neshta behavioral2/files/0x0001000000022f7f-175.dat family_neshta behavioral2/memory/436-236-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3056-244-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3080-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2128-257-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2756-269-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/992-276-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1900-281-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2428-283-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3116-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4760-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1440-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4664-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4580-305-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1072-307-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4272-313-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4976-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3388-321-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 2B77BA~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 3176 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe 228 svchost.com 3092 2B77BA~1.EXE 4848 svchost.com 3308 2B77BA~1.EXE 1392 svchost.com 1104 2B77BA~1.EXE 3572 svchost.com 2864 2B77BA~1.EXE 2628 svchost.com 2508 2B77BA~1.EXE 2180 svchost.com 5048 2B77BA~1.EXE 4844 svchost.com 4352 2B77BA~1.EXE 4632 svchost.com 1844 2B77BA~1.EXE 808 svchost.com 916 2B77BA~1.EXE 3928 svchost.com 3972 2B77BA~1.EXE 1680 svchost.com 3384 2B77BA~1.EXE 436 svchost.com 3056 2B77BA~1.EXE 3080 svchost.com 2128 2B77BA~1.EXE 2756 svchost.com 992 2B77BA~1.EXE 1900 svchost.com 2428 2B77BA~1.EXE 3116 svchost.com 4760 2B77BA~1.EXE 1440 svchost.com 4664 2B77BA~1.EXE 4580 svchost.com 1072 2B77BA~1.EXE 4272 svchost.com 4976 2B77BA~1.EXE 3388 svchost.com 4128 2B77BA~1.EXE 2192 svchost.com 3704 2B77BA~1.EXE 1520 svchost.com 3696 2B77BA~1.EXE 1536 svchost.com 1928 2B77BA~1.EXE 808 svchost.com 748 2B77BA~1.EXE 3196 svchost.com 624 2B77BA~1.EXE 4764 svchost.com 2556 2B77BA~1.EXE 1796 svchost.com 4952 2B77BA~1.EXE 1996 svchost.com 3928 2B77BA~1.EXE 3760 svchost.com 2324 2B77BA~1.EXE 1872 svchost.com 4388 2B77BA~1.EXE 4820 svchost.com 3284 2B77BA~1.EXE 2936 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys 2B77BA~1.EXE File opened for modification C:\Windows\directx.sys 2B77BA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2B77BA~1.EXE File opened for modification C:\Windows\svchost.com 2B77BA~1.EXE File opened for modification C:\Windows\svchost.com 2B77BA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2B77BA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2B77BA~1.EXE File opened for modification C:\Windows\svchost.com 2B77BA~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2B77BA~1.EXE File opened for modification C:\Windows\directx.sys 2B77BA~1.EXE File opened for modification C:\Windows\svchost.com 2B77BA~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2B77BA~1.EXE File opened for modification C:\Windows\directx.sys 2B77BA~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2B77BA~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2B77BA~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2B77BA~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2B77BA~1.EXE File opened for modification C:\Windows\svchost.com 2B77BA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2B77BA~1.EXE File opened for modification C:\Windows\directx.sys 2B77BA~1.EXE File opened for modification C:\Windows\directx.sys 2B77BA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2B77BA~1.EXE File opened for modification C:\Windows\directx.sys 2B77BA~1.EXE File opened for modification C:\Windows\svchost.com 2B77BA~1.EXE File opened for modification C:\Windows\svchost.com 2B77BA~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2B77BA~1.EXE File opened for modification C:\Windows\directx.sys 2B77BA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2B77BA~1.EXE File opened for modification C:\Windows\svchost.com 2B77BA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2B77BA~1.EXE File opened for modification C:\Windows\directx.sys 2B77BA~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2B77BA~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 2B77BA~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4944 wrote to memory of 3176 4944 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe 82 PID 4944 wrote to memory of 3176 4944 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe 82 PID 4944 wrote to memory of 3176 4944 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe 82 PID 3176 wrote to memory of 228 3176 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe 83 PID 3176 wrote to memory of 228 3176 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe 83 PID 3176 wrote to memory of 228 3176 2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe 83 PID 228 wrote to memory of 3092 228 svchost.com 84 PID 228 wrote to memory of 3092 228 svchost.com 84 PID 228 wrote to memory of 3092 228 svchost.com 84 PID 3092 wrote to memory of 4848 3092 2B77BA~1.EXE 85 PID 3092 wrote to memory of 4848 3092 2B77BA~1.EXE 85 PID 3092 wrote to memory of 4848 3092 2B77BA~1.EXE 85 PID 4848 wrote to memory of 3308 4848 svchost.com 86 PID 4848 wrote to memory of 3308 4848 svchost.com 86 PID 4848 wrote to memory of 3308 4848 svchost.com 86 PID 3308 wrote to memory of 1392 3308 2B77BA~1.EXE 87 PID 3308 wrote to memory of 1392 3308 2B77BA~1.EXE 87 PID 3308 wrote to memory of 1392 3308 2B77BA~1.EXE 87 PID 1392 wrote to memory of 1104 1392 svchost.com 88 PID 1392 wrote to memory of 1104 1392 svchost.com 88 PID 1392 wrote to memory of 1104 1392 svchost.com 88 PID 1104 wrote to memory of 3572 1104 2B77BA~1.EXE 89 PID 1104 wrote to memory of 3572 1104 2B77BA~1.EXE 89 PID 1104 wrote to memory of 3572 1104 2B77BA~1.EXE 89 PID 3572 wrote to memory of 2864 3572 svchost.com 90 PID 3572 wrote to memory of 2864 3572 svchost.com 90 PID 3572 wrote to memory of 2864 3572 svchost.com 90 PID 2864 wrote to memory of 2628 2864 2B77BA~1.EXE 91 PID 2864 wrote to memory of 2628 2864 2B77BA~1.EXE 91 PID 2864 wrote to memory of 2628 2864 2B77BA~1.EXE 91 PID 2628 wrote to memory of 2508 2628 svchost.com 92 PID 2628 wrote to memory of 2508 2628 svchost.com 92 PID 2628 wrote to memory of 2508 2628 svchost.com 92 PID 2508 wrote to memory of 2180 2508 2B77BA~1.EXE 93 PID 2508 wrote to memory of 2180 2508 2B77BA~1.EXE 93 PID 2508 wrote to memory of 2180 2508 2B77BA~1.EXE 93 PID 2180 wrote to memory of 5048 2180 svchost.com 94 PID 2180 wrote to memory of 5048 2180 svchost.com 94 PID 2180 wrote to memory of 5048 2180 svchost.com 94 PID 5048 wrote to memory of 4844 5048 2B77BA~1.EXE 95 PID 5048 wrote to memory of 4844 5048 2B77BA~1.EXE 95 PID 5048 wrote to memory of 4844 5048 2B77BA~1.EXE 95 PID 4844 wrote to memory of 4352 4844 svchost.com 96 PID 4844 wrote to memory of 4352 4844 svchost.com 96 PID 4844 wrote to memory of 4352 4844 svchost.com 96 PID 4352 wrote to memory of 4632 4352 2B77BA~1.EXE 97 PID 4352 wrote to memory of 4632 4352 2B77BA~1.EXE 97 PID 4352 wrote to memory of 4632 4352 2B77BA~1.EXE 97 PID 4632 wrote to memory of 1844 4632 svchost.com 98 PID 4632 wrote to memory of 1844 4632 svchost.com 98 PID 4632 wrote to memory of 1844 4632 svchost.com 98 PID 1844 wrote to memory of 808 1844 2B77BA~1.EXE 129 PID 1844 wrote to memory of 808 1844 2B77BA~1.EXE 129 PID 1844 wrote to memory of 808 1844 2B77BA~1.EXE 129 PID 808 wrote to memory of 916 808 svchost.com 100 PID 808 wrote to memory of 916 808 svchost.com 100 PID 808 wrote to memory of 916 808 svchost.com 100 PID 916 wrote to memory of 3928 916 2B77BA~1.EXE 138 PID 916 wrote to memory of 3928 916 2B77BA~1.EXE 138 PID 916 wrote to memory of 3928 916 2B77BA~1.EXE 138 PID 3928 wrote to memory of 3972 3928 svchost.com 183 PID 3928 wrote to memory of 3972 3928 svchost.com 183 PID 3928 wrote to memory of 3972 3928 svchost.com 183 PID 3972 wrote to memory of 1680 3972 2B77BA~1.EXE 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe"C:\Users\Admin\AppData\Local\Temp\2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2b77ba6432246dc22ae07115b8944b11470920f30d4b8e1e421a351609700499.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3176 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"11⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE20⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"23⤵
- Executes dropped EXE
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"25⤵
- Executes dropped EXE
PID:436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE26⤵
- Executes dropped EXE
PID:3056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"27⤵
- Executes dropped EXE
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE28⤵
- Executes dropped EXE
- Modifies registry class
PID:2128 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"29⤵
- Executes dropped EXE
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"31⤵
- Executes dropped EXE
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"33⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE34⤵
- Executes dropped EXE
PID:4760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"35⤵
- Executes dropped EXE
PID:1440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE36⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE38⤵
- Executes dropped EXE
- Modifies registry class
PID:1072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"39⤵
- Executes dropped EXE
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"41⤵
- Executes dropped EXE
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4128 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
PID:3704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"45⤵
- Executes dropped EXE
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE46⤵
- Executes dropped EXE
- Modifies registry class
PID:3696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE48⤵
- Executes dropped EXE
- Modifies registry class
PID:1928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"49⤵
- Executes dropped EXE
PID:808 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3196 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"53⤵
- Executes dropped EXE
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE54⤵
- Executes dropped EXE
PID:2556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"55⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"57⤵
- Executes dropped EXE
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE58⤵
- Executes dropped EXE
- Modifies registry class
PID:3928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE60⤵
- Executes dropped EXE
PID:2324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
PID:4388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE64⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"65⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE66⤵
- Checks computer location settings
PID:4800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"67⤵PID:3396
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE68⤵
- Modifies registry class
PID:3976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"69⤵
- Drops file in Windows directory
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE70⤵
- Checks computer location settings
PID:2284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"71⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE72⤵
- Checks computer location settings
- Modifies registry class
PID:3436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"73⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE74⤵PID:1104
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE76⤵
- Modifies registry class
PID:4624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE78⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:1368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"79⤵PID:4916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE80⤵
- Modifies registry class
PID:4948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"81⤵
- Drops file in Windows directory
PID:4272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE82⤵PID:3256
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"83⤵
- Drops file in Windows directory
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE84⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"85⤵PID:5104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE86⤵
- Checks computer location settings
PID:516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"87⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE88⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"89⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE90⤵
- Drops file in Windows directory
- Modifies registry class
PID:2072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"91⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE92⤵
- Drops file in Windows directory
- Modifies registry class
PID:768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"93⤵PID:4588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE94⤵
- Modifies registry class
PID:1444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"95⤵PID:4160
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE96⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"97⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE98⤵
- Modifies registry class
PID:856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"99⤵
- Drops file in Windows directory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE100⤵PID:4604
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"101⤵PID:1848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE102⤵PID:1964
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"103⤵
- System Location Discovery: System Language Discovery
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE104⤵
- Modifies registry class
PID:4956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"105⤵PID:452
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE106⤵
- Drops file in Windows directory
PID:1812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"107⤵
- Drops file in Windows directory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE108⤵
- Checks computer location settings
PID:3644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"109⤵PID:4396
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE110⤵
- Checks computer location settings
PID:4412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"111⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE112⤵
- Checks computer location settings
- Modifies registry class
PID:4472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"113⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE114⤵PID:228
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"115⤵
- System Location Discovery: System Language Discovery
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE116⤵
- Modifies registry class
PID:772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"117⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE118⤵
- Checks computer location settings
- Modifies registry class
PID:1048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"119⤵PID:220
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE120⤵
- Checks computer location settings
- Modifies registry class
PID:1476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE"121⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2B77BA~1.EXE122⤵PID:4424
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-