Analysis
-
max time kernel
94s -
max time network
100s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2024 19:41
Behavioral task
behavioral1
Sample
0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe
Resource
win10v2004-20241007-en
General
-
Target
0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe
-
Size
179KB
-
MD5
458e8e33ac9c9da78555f94022175df8
-
SHA1
4e7aa7d636d4beffc950d4d1a98cd1afffdf445b
-
SHA256
0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7
-
SHA512
62fd8869853c1016deee0851b074f95c9affd9d95aed56347da01c0118275de47c393855f4eb3714f65502a9c3498caa5a25a1f5fd9dd5f0270c4d36a523ca19
-
SSDEEP
3072:sr85C1IXNLM69x07Jb00PAqPtHr85Cxr85C:k91icJzXFL9N9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000b000000023b8e-4.dat family_neshta behavioral2/files/0x000a000000023b93-11.dat family_neshta behavioral2/memory/2056-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4132-20-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3276-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3316-38-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1232-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4100-51-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3796-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4544-62-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2524-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1736-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002035f-77.dat family_neshta behavioral2/files/0x000700000002029a-80.dat family_neshta behavioral2/files/0x0006000000020232-82.dat family_neshta behavioral2/memory/2508-111-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020249-114.dat family_neshta behavioral2/files/0x00010000000202ab-107.dat family_neshta behavioral2/memory/3504-96-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000202c3-95.dat family_neshta behavioral2/files/0x0004000000020352-94.dat family_neshta behavioral2/files/0x00010000000202b0-93.dat family_neshta behavioral2/files/0x0001000000020241-92.dat family_neshta behavioral2/memory/1988-115-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2756-126-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214f7-143.dat family_neshta behavioral2/files/0x00010000000214f6-142.dat family_neshta behavioral2/files/0x00010000000214f5-141.dat family_neshta behavioral2/files/0x0001000000022f52-152.dat family_neshta behavioral2/memory/4676-158-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1884-180-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167c0-192.dat family_neshta behavioral2/files/0x00010000000167e6-191.dat family_neshta behavioral2/files/0x00010000000167e7-190.dat family_neshta behavioral2/files/0x00010000000167c2-189.dat family_neshta behavioral2/files/0x00010000000167ca-179.dat family_neshta behavioral2/files/0x0001000000016852-177.dat family_neshta behavioral2/files/0x00010000000167c6-176.dat family_neshta behavioral2/files/0x00010000000167c8-175.dat family_neshta behavioral2/files/0x00010000000167ad-174.dat family_neshta behavioral2/files/0x00010000000167ff-173.dat family_neshta behavioral2/files/0x0001000000022f90-156.dat family_neshta behavioral2/memory/3408-231-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2448-233-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4836-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4872-246-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1660-247-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3104-249-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2060-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3240-257-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1828-263-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2560-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4824-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2328-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1872-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3724-286-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/372-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3796-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/404-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2212-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2460-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1736-305-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2464-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3504-318-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 0F131A~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 1068 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe 2056 svchost.com 4132 0F131A~1.EXE 3276 svchost.com 3316 0F131A~1.EXE 1232 svchost.com 4100 0F131A~1.EXE 3796 svchost.com 4544 0F131A~1.EXE 2524 svchost.com 1736 0F131A~1.EXE 3504 svchost.com 2508 0F131A~1.EXE 1988 svchost.com 2756 0F131A~1.EXE 4676 svchost.com 1884 0F131A~1.EXE 3408 svchost.com 2448 0F131A~1.EXE 4836 svchost.com 4872 0F131A~1.EXE 1660 svchost.com 3104 0F131A~1.EXE 2060 svchost.com 3240 0F131A~1.EXE 1828 svchost.com 2560 0F131A~1.EXE 4824 svchost.com 2328 0F131A~1.EXE 1872 svchost.com 3724 0F131A~1.EXE 372 svchost.com 3796 0F131A~1.EXE 404 svchost.com 2212 0F131A~1.EXE 2460 svchost.com 1736 0F131A~1.EXE 2464 svchost.com 3504 0F131A~1.EXE 4324 svchost.com 1808 0F131A~1.EXE 4296 svchost.com 1716 0F131A~1.EXE 1628 svchost.com 4380 0F131A~1.EXE 2888 svchost.com 3596 0F131A~1.EXE 2348 svchost.com 3236 0F131A~1.EXE 4452 svchost.com 3616 0F131A~1.EXE 1972 svchost.com 2044 0F131A~1.EXE 336 svchost.com 2668 0F131A~1.EXE 4364 svchost.com 636 0F131A~1.EXE 4084 svchost.com 3688 0F131A~1.EXE 228 svchost.com 1980 0F131A~1.EXE 4588 svchost.com 400 0F131A~1.EXE 3732 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\svchost.com 0F131A~1.EXE File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 0F131A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0F131A~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 0F131A~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1068 1268 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe 83 PID 1268 wrote to memory of 1068 1268 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe 83 PID 1268 wrote to memory of 1068 1268 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe 83 PID 1068 wrote to memory of 2056 1068 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe 84 PID 1068 wrote to memory of 2056 1068 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe 84 PID 1068 wrote to memory of 2056 1068 0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe 84 PID 2056 wrote to memory of 4132 2056 svchost.com 85 PID 2056 wrote to memory of 4132 2056 svchost.com 85 PID 2056 wrote to memory of 4132 2056 svchost.com 85 PID 4132 wrote to memory of 3276 4132 0F131A~1.EXE 86 PID 4132 wrote to memory of 3276 4132 0F131A~1.EXE 86 PID 4132 wrote to memory of 3276 4132 0F131A~1.EXE 86 PID 3276 wrote to memory of 3316 3276 svchost.com 87 PID 3276 wrote to memory of 3316 3276 svchost.com 87 PID 3276 wrote to memory of 3316 3276 svchost.com 87 PID 3316 wrote to memory of 1232 3316 0F131A~1.EXE 88 PID 3316 wrote to memory of 1232 3316 0F131A~1.EXE 88 PID 3316 wrote to memory of 1232 3316 0F131A~1.EXE 88 PID 1232 wrote to memory of 4100 1232 svchost.com 89 PID 1232 wrote to memory of 4100 1232 svchost.com 89 PID 1232 wrote to memory of 4100 1232 svchost.com 89 PID 4100 wrote to memory of 3796 4100 0F131A~1.EXE 115 PID 4100 wrote to memory of 3796 4100 0F131A~1.EXE 115 PID 4100 wrote to memory of 3796 4100 0F131A~1.EXE 115 PID 3796 wrote to memory of 4544 3796 svchost.com 91 PID 3796 wrote to memory of 4544 3796 svchost.com 91 PID 3796 wrote to memory of 4544 3796 svchost.com 91 PID 4544 wrote to memory of 2524 4544 0F131A~1.EXE 92 PID 4544 wrote to memory of 2524 4544 0F131A~1.EXE 92 PID 4544 wrote to memory of 2524 4544 0F131A~1.EXE 92 PID 2524 wrote to memory of 1736 2524 svchost.com 119 PID 2524 wrote to memory of 1736 2524 svchost.com 119 PID 2524 wrote to memory of 1736 2524 svchost.com 119 PID 1736 wrote to memory of 3504 1736 0F131A~1.EXE 121 PID 1736 wrote to memory of 3504 1736 0F131A~1.EXE 121 PID 1736 wrote to memory of 3504 1736 0F131A~1.EXE 121 PID 3504 wrote to memory of 2508 3504 svchost.com 95 PID 3504 wrote to memory of 2508 3504 svchost.com 95 PID 3504 wrote to memory of 2508 3504 svchost.com 95 PID 2508 wrote to memory of 1988 2508 0F131A~1.EXE 96 PID 2508 wrote to memory of 1988 2508 0F131A~1.EXE 96 PID 2508 wrote to memory of 1988 2508 0F131A~1.EXE 96 PID 1988 wrote to memory of 2756 1988 svchost.com 97 PID 1988 wrote to memory of 2756 1988 svchost.com 97 PID 1988 wrote to memory of 2756 1988 svchost.com 97 PID 2756 wrote to memory of 4676 2756 0F131A~1.EXE 98 PID 2756 wrote to memory of 4676 2756 0F131A~1.EXE 98 PID 2756 wrote to memory of 4676 2756 0F131A~1.EXE 98 PID 4676 wrote to memory of 1884 4676 svchost.com 99 PID 4676 wrote to memory of 1884 4676 svchost.com 99 PID 4676 wrote to memory of 1884 4676 svchost.com 99 PID 1884 wrote to memory of 3408 1884 0F131A~1.EXE 100 PID 1884 wrote to memory of 3408 1884 0F131A~1.EXE 100 PID 1884 wrote to memory of 3408 1884 0F131A~1.EXE 100 PID 3408 wrote to memory of 2448 3408 svchost.com 101 PID 3408 wrote to memory of 2448 3408 svchost.com 101 PID 3408 wrote to memory of 2448 3408 svchost.com 101 PID 2448 wrote to memory of 4836 2448 0F131A~1.EXE 102 PID 2448 wrote to memory of 4836 2448 0F131A~1.EXE 102 PID 2448 wrote to memory of 4836 2448 0F131A~1.EXE 102 PID 4836 wrote to memory of 4872 4836 svchost.com 221 PID 4836 wrote to memory of 4872 4836 svchost.com 221 PID 4836 wrote to memory of 4872 4836 svchost.com 221 PID 4872 wrote to memory of 1660 4872 0F131A~1.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe"C:\Users\Admin\AppData\Local\Temp\0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\0f131a28e891367b93ee90164dc65824cc9aa185851ae8257dd92c79a35e72f7.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE12⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE14⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"25⤵
- Executes dropped EXE
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE28⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"29⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"31⤵
- Executes dropped EXE
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE32⤵
- Executes dropped EXE
PID:3724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"33⤵
- Executes dropped EXE
PID:372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
PID:3796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:404 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
PID:2212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"37⤵
- Executes dropped EXE
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
PID:1736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE40⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"41⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"43⤵
- Executes dropped EXE
PID:4296 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE44⤵
- Executes dropped EXE
PID:1716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"45⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"47⤵
- Executes dropped EXE
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"49⤵
- Executes dropped EXE
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"51⤵
- Executes dropped EXE
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE52⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"53⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE54⤵
- Executes dropped EXE
- Modifies registry class
PID:2044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:336 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"57⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE58⤵
- Executes dropped EXE
- Modifies registry class
PID:636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"59⤵
- Executes dropped EXE
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
PID:3688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE62⤵
- Executes dropped EXE
- Modifies registry class
PID:1980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"65⤵
- Executes dropped EXE
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE66⤵
- System Location Discovery: System Language Discovery
PID:1364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE68⤵
- System Location Discovery: System Language Discovery
PID:4832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"69⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE70⤵PID:2052
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"71⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE72⤵
- Checks computer location settings
PID:3288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE74⤵
- Modifies registry class
PID:3624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"75⤵
- Drops file in Windows directory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE76⤵
- Checks computer location settings
PID:1640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE78⤵
- Modifies registry class
PID:508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"79⤵
- Drops file in Windows directory
PID:1160 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE80⤵
- Modifies registry class
PID:1592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"81⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE82⤵
- Checks computer location settings
PID:2820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"83⤵
- Drops file in Windows directory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE84⤵
- System Location Discovery: System Language Discovery
PID:2092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"85⤵PID:4924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE86⤵PID:4512
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"87⤵PID:3660
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE88⤵
- Modifies registry class
PID:2652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"89⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE90⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"91⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE92⤵
- Drops file in Windows directory
PID:808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"93⤵
- System Location Discovery: System Language Discovery
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE94⤵
- Modifies registry class
PID:1296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"95⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE96⤵
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"97⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE98⤵PID:1968
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"99⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE100⤵PID:2732
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"101⤵PID:380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE102⤵PID:1980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"103⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE104⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"105⤵PID:3900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE106⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"107⤵
- Drops file in Windows directory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE108⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:5112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"109⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE110⤵
- Checks computer location settings
PID:4000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"111⤵
- Drops file in Windows directory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE112⤵
- Modifies registry class
PID:1800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"113⤵PID:4656
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE114⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:5076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"115⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE116⤵PID:4464
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"117⤵PID:5108
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE118⤵
- Drops file in Windows directory
- Modifies registry class
PID:1092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"119⤵PID:4524
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE120⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:3304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE"121⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\0F131A~1.EXE122⤵
- Modifies registry class
PID:1048
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-