Analysis
-
max time kernel
38s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 23:17
Behavioral task
behavioral1
Sample
a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe
Resource
win10v2004-20241007-en
General
-
Target
a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe
-
Size
356KB
-
MD5
5cd3caf696a3dbe90c77067537f37380
-
SHA1
51ee9003fa2f40ba67df5bcd49805578d487456a
-
SHA256
a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112
-
SHA512
8dd455b64548ff541a70c6b11767de254336d8f0552547e2af296006d536df41dc1d4fba40b864a8f0d786c2594c64c5c8d61643140fa13e964dc791294b08d2
-
SSDEEP
6144:k9NPDAWKklwXx39oBLohizkvxhlDqJd+9:SsWPlwX2Lov5Hq
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000d000000023b49-4.dat family_neshta behavioral2/files/0x0008000000023be3-10.dat family_neshta behavioral2/memory/2320-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2524-26-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1748-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3592-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5044-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1380-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2576-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3468-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2408-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3444-74-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1268-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1448-80-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2360-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020343-93.dat family_neshta behavioral2/files/0x000600000002021e-106.dat family_neshta behavioral2/memory/4708-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020335-112.dat family_neshta behavioral2/files/0x000100000002028f-122.dat family_neshta behavioral2/files/0x0004000000020348-121.dat family_neshta behavioral2/files/0x00010000000202a7-120.dat family_neshta behavioral2/files/0x0004000000020336-119.dat family_neshta behavioral2/memory/3804-125-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2892-136-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3420-137-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4964-148-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214d8-157.dat family_neshta behavioral2/files/0x00010000000214da-165.dat family_neshta behavioral2/memory/1140-176-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214d9-163.dat family_neshta behavioral2/memory/4152-160-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f2d-178.dat family_neshta behavioral2/files/0x0001000000022f2e-181.dat family_neshta behavioral2/files/0x0001000000022f2f-186.dat family_neshta behavioral2/files/0x0001000000022f6b-191.dat family_neshta behavioral2/files/0x00010000000167af-195.dat family_neshta behavioral2/files/0x0001000000016801-193.dat family_neshta behavioral2/files/0x0001000000016804-203.dat family_neshta behavioral2/files/0x00010000000167e8-206.dat family_neshta behavioral2/files/0x000100000001dbd1-212.dat family_neshta behavioral2/memory/3556-240-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5008-247-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4536-253-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1344-260-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4328-261-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3120-275-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1508-276-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4228-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3424-284-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1236-286-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3392-292-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1260-294-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1620-300-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1380-302-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2576-308-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1052-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2424-316-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1152-318-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/868-324-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4560-331-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5032-332-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2360-334-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4324-340-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation A02857~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 1856 a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe 2320 svchost.com 2524 A02857~1.EXE 1748 svchost.com 3592 A02857~1.EXE 5044 svchost.com 1380 A02857~1.EXE 2576 svchost.com 3468 A02857~1.EXE 2408 svchost.com 3444 A02857~1.EXE 1268 svchost.com 1448 A02857~1.EXE 2360 svchost.com 4708 A02857~1.EXE 3804 svchost.com 2892 A02857~1.EXE 3420 svchost.com 4964 A02857~1.EXE 4152 svchost.com 1140 A02857~1.EXE 3556 svchost.com 5008 A02857~1.EXE 4536 svchost.com 1344 A02857~1.EXE 4328 svchost.com 3120 A02857~1.EXE 1508 svchost.com 4228 A02857~1.EXE 3424 svchost.com 1236 A02857~1.EXE 3392 svchost.com 1260 A02857~1.EXE 1620 svchost.com 1380 A02857~1.EXE 2576 svchost.com 1052 A02857~1.EXE 2424 svchost.com 1152 A02857~1.EXE 868 svchost.com 4560 A02857~1.EXE 5032 svchost.com 2360 A02857~1.EXE 4324 svchost.com 4432 A02857~1.EXE 456 svchost.com 1452 A02857~1.EXE 4024 svchost.com 2580 A02857~1.EXE 3952 svchost.com 3092 A02857~1.EXE 4964 svchost.com 1492 A02857~1.EXE 5068 svchost.com 1140 A02857~1.EXE 1716 svchost.com 1248 A02857~1.EXE 3620 svchost.com 4540 A02857~1.EXE 3112 svchost.com 412 A02857~1.EXE 4760 svchost.com 4448 A02857~1.EXE 2268 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys A02857~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys A02857~1.EXE File opened for modification C:\Windows\directx.sys A02857~1.EXE File opened for modification C:\Windows\directx.sys A02857~1.EXE File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\directx.sys A02857~1.EXE File opened for modification C:\Windows\directx.sys A02857~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys A02857~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys A02857~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\directx.sys A02857~1.EXE File opened for modification C:\Windows\directx.sys A02857~1.EXE File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\directx.sys A02857~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com A02857~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A02857~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings A02857~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3236 wrote to memory of 1856 3236 a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe 83 PID 3236 wrote to memory of 1856 3236 a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe 83 PID 3236 wrote to memory of 1856 3236 a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe 83 PID 1856 wrote to memory of 2320 1856 a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe 84 PID 1856 wrote to memory of 2320 1856 a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe 84 PID 1856 wrote to memory of 2320 1856 a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe 84 PID 2320 wrote to memory of 2524 2320 svchost.com 85 PID 2320 wrote to memory of 2524 2320 svchost.com 85 PID 2320 wrote to memory of 2524 2320 svchost.com 85 PID 2524 wrote to memory of 1748 2524 A02857~1.EXE 86 PID 2524 wrote to memory of 1748 2524 A02857~1.EXE 86 PID 2524 wrote to memory of 1748 2524 A02857~1.EXE 86 PID 1748 wrote to memory of 3592 1748 svchost.com 87 PID 1748 wrote to memory of 3592 1748 svchost.com 87 PID 1748 wrote to memory of 3592 1748 svchost.com 87 PID 3592 wrote to memory of 5044 3592 A02857~1.EXE 88 PID 3592 wrote to memory of 5044 3592 A02857~1.EXE 88 PID 3592 wrote to memory of 5044 3592 A02857~1.EXE 88 PID 5044 wrote to memory of 1380 5044 svchost.com 117 PID 5044 wrote to memory of 1380 5044 svchost.com 117 PID 5044 wrote to memory of 1380 5044 svchost.com 117 PID 1380 wrote to memory of 2576 1380 A02857~1.EXE 118 PID 1380 wrote to memory of 2576 1380 A02857~1.EXE 118 PID 1380 wrote to memory of 2576 1380 A02857~1.EXE 118 PID 2576 wrote to memory of 3468 2576 svchost.com 91 PID 2576 wrote to memory of 3468 2576 svchost.com 91 PID 2576 wrote to memory of 3468 2576 svchost.com 91 PID 3468 wrote to memory of 2408 3468 A02857~1.EXE 92 PID 3468 wrote to memory of 2408 3468 A02857~1.EXE 92 PID 3468 wrote to memory of 2408 3468 A02857~1.EXE 92 PID 2408 wrote to memory of 3444 2408 svchost.com 93 PID 2408 wrote to memory of 3444 2408 svchost.com 93 PID 2408 wrote to memory of 3444 2408 svchost.com 93 PID 3444 wrote to memory of 1268 3444 A02857~1.EXE 94 PID 3444 wrote to memory of 1268 3444 A02857~1.EXE 94 PID 3444 wrote to memory of 1268 3444 A02857~1.EXE 94 PID 1268 wrote to memory of 1448 1268 svchost.com 95 PID 1268 wrote to memory of 1448 1268 svchost.com 95 PID 1268 wrote to memory of 1448 1268 svchost.com 95 PID 1448 wrote to memory of 2360 1448 A02857~1.EXE 166 PID 1448 wrote to memory of 2360 1448 A02857~1.EXE 166 PID 1448 wrote to memory of 2360 1448 A02857~1.EXE 166 PID 2360 wrote to memory of 4708 2360 svchost.com 97 PID 2360 wrote to memory of 4708 2360 svchost.com 97 PID 2360 wrote to memory of 4708 2360 svchost.com 97 PID 4708 wrote to memory of 3804 4708 A02857~1.EXE 98 PID 4708 wrote to memory of 3804 4708 A02857~1.EXE 98 PID 4708 wrote to memory of 3804 4708 A02857~1.EXE 98 PID 3804 wrote to memory of 2892 3804 svchost.com 171 PID 3804 wrote to memory of 2892 3804 svchost.com 171 PID 3804 wrote to memory of 2892 3804 svchost.com 171 PID 2892 wrote to memory of 3420 2892 A02857~1.EXE 100 PID 2892 wrote to memory of 3420 2892 A02857~1.EXE 100 PID 2892 wrote to memory of 3420 2892 A02857~1.EXE 100 PID 3420 wrote to memory of 4964 3420 svchost.com 134 PID 3420 wrote to memory of 4964 3420 svchost.com 134 PID 3420 wrote to memory of 4964 3420 svchost.com 134 PID 4964 wrote to memory of 4152 4964 A02857~1.EXE 102 PID 4964 wrote to memory of 4152 4964 A02857~1.EXE 102 PID 4964 wrote to memory of 4152 4964 A02857~1.EXE 102 PID 4152 wrote to memory of 1140 4152 svchost.com 137 PID 4152 wrote to memory of 1140 4152 svchost.com 137 PID 4152 wrote to memory of 1140 4152 svchost.com 137 PID 1140 wrote to memory of 3556 1140 A02857~1.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe"C:\Users\Admin\AppData\Local\Temp\a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\a02857c9e35f9e22c687999c820398c12fbff61dbfc0a60061b31f9453743112N.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE12⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"23⤵
- Executes dropped EXE
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE24⤵
- Executes dropped EXE
- Modifies registry class
PID:5008 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"25⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE26⤵
- Executes dropped EXE
PID:1344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4328 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"29⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE30⤵
- Executes dropped EXE
- Modifies registry class
PID:4228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"33⤵
- Executes dropped EXE
PID:3392 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
PID:1260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"35⤵
- Executes dropped EXE
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE36⤵
- Executes dropped EXE
- Modifies registry class
PID:1380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"39⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE40⤵
- Executes dropped EXE
PID:1152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"41⤵
- Executes dropped EXE
PID:868 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"43⤵
- Executes dropped EXE
PID:5032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE44⤵
- Executes dropped EXE
PID:2360 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"45⤵
- Executes dropped EXE
PID:4324 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
PID:4432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:456 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"49⤵
- Executes dropped EXE
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"51⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE52⤵
- Executes dropped EXE
PID:3092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
PID:1492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"55⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE56⤵
- Executes dropped EXE
- Modifies registry class
PID:1140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
PID:1248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"59⤵
- Executes dropped EXE
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
PID:4540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE62⤵
- Executes dropped EXE
- Modifies registry class
PID:412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"65⤵
- Executes dropped EXE
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE66⤵
- Drops file in Windows directory
- Modifies registry class
PID:1852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:4860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE68⤵PID:452
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"69⤵
- System Location Discovery: System Language Discovery
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE70⤵
- Drops file in Windows directory
PID:2720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"71⤵
- System Location Discovery: System Language Discovery
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE72⤵PID:3744
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"73⤵
- Drops file in Windows directory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE74⤵
- Drops file in Windows directory
PID:2044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"75⤵PID:4976
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE76⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"77⤵PID:3180
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE78⤵
- Checks computer location settings
- Modifies registry class
PID:3048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"79⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE80⤵
- System Location Discovery: System Language Discovery
PID:5000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"81⤵
- Drops file in Windows directory
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE82⤵
- System Location Discovery: System Language Discovery
PID:4240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"83⤵
- Drops file in Windows directory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE84⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"85⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE86⤵
- Checks computer location settings
PID:624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"87⤵PID:2304
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE88⤵
- Drops file in Windows directory
PID:3220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"89⤵PID:4112
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE90⤵PID:2892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"91⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE92⤵PID:3828
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"93⤵PID:5004
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE94⤵
- Modifies registry class
PID:4084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"95⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE96⤵
- Drops file in Windows directory
PID:4016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"97⤵
- System Location Discovery: System Language Discovery
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE98⤵PID:1720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"99⤵
- Drops file in Windows directory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE100⤵PID:2132
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"101⤵PID:3984
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE102⤵PID:4464
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"103⤵
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE104⤵
- Checks computer location settings
- Modifies registry class
PID:4760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"105⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE106⤵
- Checks computer location settings
PID:3936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"107⤵PID:5096
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE108⤵
- Checks computer location settings
PID:1868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"109⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE110⤵PID:4456
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"111⤵PID:4864
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE112⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"113⤵PID:1220
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE114⤵
- Modifies registry class
PID:2876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"115⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE116⤵
- Modifies registry class
PID:404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"117⤵
- Drops file in Windows directory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE118⤵
- Checks computer location settings
- Modifies registry class
PID:2980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"119⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE120⤵
- Checks computer location settings
PID:5052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE"121⤵PID:4852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\A02857~1.EXE122⤵
- Checks computer location settings
- Modifies registry class
PID:4520
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-