Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
07-12-2024 00:57
Behavioral task
behavioral1
Sample
98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe
Resource
win10v2004-20241007-en
General
-
Target
98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe
-
Size
150KB
-
MD5
32f359a354382e547458d2e22b49e736
-
SHA1
ee37cb6d361467d2831cc893c6a8488a35998537
-
SHA256
98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c
-
SHA512
e887ebea2b3fa05191586dd454f0b319a0c8c4989919b50252b17e2bb65512c93d9e731d3c6aaf2c1b9884ca5ae6f78647662f067612bc403e8542f1d7cdcd5c
-
SSDEEP
3072:sr85CNYC16JxUN5PhGgYqqkQFWzKVzMezr85C:k9NYA5PhGPqCFWzKVzMeP9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000b000000023b7f-4.dat family_neshta behavioral2/files/0x000a000000023b84-10.dat family_neshta behavioral2/memory/2228-18-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5028-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/900-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3544-34-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3168-42-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4488-53-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3284-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3444-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3128-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4532-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2444-78-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4604-82-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1552-90-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2540-94-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4556-102-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3472-106-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020358-115.dat family_neshta behavioral2/files/0x0008000000020229-119.dat family_neshta behavioral2/files/0x0006000000020227-122.dat family_neshta behavioral2/files/0x0006000000020240-139.dat family_neshta behavioral2/files/0x000400000002031e-138.dat family_neshta behavioral2/memory/3156-140-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000202a4-137.dat family_neshta behavioral2/files/0x000400000002035d-136.dat family_neshta behavioral2/files/0x00010000000202bc-135.dat family_neshta behavioral2/files/0x000400000002034b-134.dat family_neshta behavioral2/files/0x00010000000202a9-133.dat family_neshta behavioral2/memory/5100-151-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/968-152-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1000-156-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3904-164-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3428-168-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4080-176-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1652-187-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/640-199-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5016-206-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4088-261-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4864-268-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/412-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3136-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3972-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2884-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2036-300-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5000-307-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2692-309-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4264-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4592-317-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2352-319-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4520-325-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/728-330-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2512-333-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4680-335-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/376-341-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3460-343-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/220-349-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1820-356-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1336-357-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2080-359-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3388-365-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2440-367-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3904-373-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3320-380-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 98FB78~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 400 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe 2228 svchost.com 5028 98FB78~1.EXE 900 svchost.com 3544 98FB78~1.EXE 3168 svchost.com 4488 98FB78~1.EXE 3284 svchost.com 3444 98FB78~1.EXE 3128 svchost.com 4532 98FB78~1.EXE 2444 svchost.com 4604 98FB78~1.EXE 1552 svchost.com 2540 98FB78~1.EXE 4556 svchost.com 3472 98FB78~1.EXE 3156 svchost.com 5100 98FB78~1.EXE 968 svchost.com 1000 98FB78~1.EXE 3904 svchost.com 3428 98FB78~1.EXE 4080 svchost.com 1652 98FB78~1.EXE 640 svchost.com 5016 98FB78~1.EXE 4088 svchost.com 4864 98FB78~1.EXE 412 svchost.com 3136 98FB78~1.EXE 3972 svchost.com 2884 98FB78~1.EXE 2036 svchost.com 5000 98FB78~1.EXE 2692 svchost.com 4264 98FB78~1.EXE 4592 svchost.com 2352 98FB78~1.EXE 4520 svchost.com 728 98FB78~1.EXE 2512 svchost.com 4680 98FB78~1.EXE 376 svchost.com 3460 98FB78~1.EXE 220 svchost.com 1820 98FB78~1.EXE 1336 svchost.com 2080 98FB78~1.EXE 3388 svchost.com 2440 98FB78~1.EXE 3904 svchost.com 3320 98FB78~1.EXE 2836 svchost.com 4452 98FB78~1.EXE 5112 svchost.com 1852 98FB78~1.EXE 4880 svchost.com 4620 98FB78~1.EXE 4980 svchost.com 748 98FB78~1.EXE 3936 svchost.com 544 98FB78~1.EXE 4088 svchost.com -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 98FB78~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 98FB78~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 98FB78~1.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 98FB78~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 98FB78~1.EXE File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 98FB78~1.EXE File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 98FB78~1.EXE File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaw.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 98FB78~1.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys 98FB78~1.EXE File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\directx.sys 98FB78~1.EXE File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 98FB78~1.EXE File opened for modification C:\Windows\directx.sys 98FB78~1.EXE File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 98FB78~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 98FB78~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 98FB78~1.EXE File opened for modification C:\Windows\directx.sys 98FB78~1.EXE File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\directx.sys 98FB78~1.EXE File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\directx.sys 98FB78~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 98FB78~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\directx.sys 98FB78~1.EXE File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\directx.sys 98FB78~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\directx.sys 98FB78~1.EXE File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 98FB78~1.EXE File opened for modification C:\Windows\directx.sys 98FB78~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 98FB78~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 98FB78~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98FB78~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 98FB78~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3028 wrote to memory of 400 3028 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe 83 PID 3028 wrote to memory of 400 3028 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe 83 PID 3028 wrote to memory of 400 3028 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe 83 PID 400 wrote to memory of 2228 400 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe 84 PID 400 wrote to memory of 2228 400 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe 84 PID 400 wrote to memory of 2228 400 98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe 84 PID 2228 wrote to memory of 5028 2228 svchost.com 85 PID 2228 wrote to memory of 5028 2228 svchost.com 85 PID 2228 wrote to memory of 5028 2228 svchost.com 85 PID 5028 wrote to memory of 900 5028 98FB78~1.EXE 86 PID 5028 wrote to memory of 900 5028 98FB78~1.EXE 86 PID 5028 wrote to memory of 900 5028 98FB78~1.EXE 86 PID 900 wrote to memory of 3544 900 svchost.com 87 PID 900 wrote to memory of 3544 900 svchost.com 87 PID 900 wrote to memory of 3544 900 svchost.com 87 PID 3544 wrote to memory of 3168 3544 98FB78~1.EXE 88 PID 3544 wrote to memory of 3168 3544 98FB78~1.EXE 88 PID 3544 wrote to memory of 3168 3544 98FB78~1.EXE 88 PID 3168 wrote to memory of 4488 3168 svchost.com 89 PID 3168 wrote to memory of 4488 3168 svchost.com 89 PID 3168 wrote to memory of 4488 3168 svchost.com 89 PID 4488 wrote to memory of 3284 4488 98FB78~1.EXE 90 PID 4488 wrote to memory of 3284 4488 98FB78~1.EXE 90 PID 4488 wrote to memory of 3284 4488 98FB78~1.EXE 90 PID 3284 wrote to memory of 3444 3284 svchost.com 91 PID 3284 wrote to memory of 3444 3284 svchost.com 91 PID 3284 wrote to memory of 3444 3284 svchost.com 91 PID 3444 wrote to memory of 3128 3444 98FB78~1.EXE 92 PID 3444 wrote to memory of 3128 3444 98FB78~1.EXE 92 PID 3444 wrote to memory of 3128 3444 98FB78~1.EXE 92 PID 3128 wrote to memory of 4532 3128 svchost.com 93 PID 3128 wrote to memory of 4532 3128 svchost.com 93 PID 3128 wrote to memory of 4532 3128 svchost.com 93 PID 4532 wrote to memory of 2444 4532 98FB78~1.EXE 94 PID 4532 wrote to memory of 2444 4532 98FB78~1.EXE 94 PID 4532 wrote to memory of 2444 4532 98FB78~1.EXE 94 PID 2444 wrote to memory of 4604 2444 svchost.com 95 PID 2444 wrote to memory of 4604 2444 svchost.com 95 PID 2444 wrote to memory of 4604 2444 svchost.com 95 PID 4604 wrote to memory of 1552 4604 98FB78~1.EXE 96 PID 4604 wrote to memory of 1552 4604 98FB78~1.EXE 96 PID 4604 wrote to memory of 1552 4604 98FB78~1.EXE 96 PID 1552 wrote to memory of 2540 1552 svchost.com 97 PID 1552 wrote to memory of 2540 1552 svchost.com 97 PID 1552 wrote to memory of 2540 1552 svchost.com 97 PID 2540 wrote to memory of 4556 2540 98FB78~1.EXE 98 PID 2540 wrote to memory of 4556 2540 98FB78~1.EXE 98 PID 2540 wrote to memory of 4556 2540 98FB78~1.EXE 98 PID 4556 wrote to memory of 3472 4556 svchost.com 99 PID 4556 wrote to memory of 3472 4556 svchost.com 99 PID 4556 wrote to memory of 3472 4556 svchost.com 99 PID 3472 wrote to memory of 3156 3472 98FB78~1.EXE 100 PID 3472 wrote to memory of 3156 3472 98FB78~1.EXE 100 PID 3472 wrote to memory of 3156 3472 98FB78~1.EXE 100 PID 3156 wrote to memory of 5100 3156 svchost.com 101 PID 3156 wrote to memory of 5100 3156 svchost.com 101 PID 3156 wrote to memory of 5100 3156 svchost.com 101 PID 5100 wrote to memory of 968 5100 98FB78~1.EXE 102 PID 5100 wrote to memory of 968 5100 98FB78~1.EXE 102 PID 5100 wrote to memory of 968 5100 98FB78~1.EXE 102 PID 968 wrote to memory of 1000 968 svchost.com 170 PID 968 wrote to memory of 1000 968 svchost.com 170 PID 968 wrote to memory of 1000 968 svchost.com 170 PID 1000 wrote to memory of 3904 1000 98FB78~1.EXE 210
Processes
-
C:\Users\Admin\AppData\Local\Temp\98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe"C:\Users\Admin\AppData\Local\Temp\98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\98fb7808bd50d136c90e6f4e0ecaa76244f2c9958f84fba64ff3d801133fa43c.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE8⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"15⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"19⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"23⤵
- Executes dropped EXE
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE24⤵
- Executes dropped EXE
- Modifies registry class
PID:3428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE26⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"27⤵
- Executes dropped EXE
PID:640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE28⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"29⤵
- Executes dropped EXE
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE30⤵
- Executes dropped EXE
PID:4864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:412 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"33⤵
- Executes dropped EXE
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"35⤵
- Executes dropped EXE
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
PID:5000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE40⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE42⤵
- Executes dropped EXE
- Modifies registry class
PID:728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"43⤵
- Executes dropped EXE
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE44⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4680 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"45⤵
- Executes dropped EXE
PID:376 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE46⤵
- Executes dropped EXE
- Modifies registry class
PID:3460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"47⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE48⤵
- Executes dropped EXE
PID:1820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE50⤵
- Executes dropped EXE
- Modifies registry class
PID:2080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"51⤵
- Executes dropped EXE
PID:3388 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
PID:2440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
PID:1852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE60⤵
- Executes dropped EXE
PID:4620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
PID:748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4088 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE66⤵
- Checks computer location settings
- Modifies registry class
PID:4840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"67⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE68⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"69⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE70⤵
- Drops file in Windows directory
- Modifies registry class
PID:1096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"71⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE72⤵
- Modifies registry class
PID:4676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"73⤵
- Drops file in Windows directory
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE74⤵
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"75⤵
- Drops file in Windows directory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE76⤵
- Drops file in Windows directory
PID:4280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"77⤵
- Drops file in Windows directory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE78⤵
- Checks computer location settings
- Drops file in Windows directory
PID:1368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"79⤵PID:2592
-
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE80⤵
- Drops file in Windows directory
PID:4200 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"81⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE82⤵PID:2552
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"83⤵PID:376
-
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE84⤵
- Checks computer location settings
PID:836 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"85⤵
- System Location Discovery: System Language Discovery
PID:116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE86⤵
- Checks computer location settings
PID:208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"87⤵
- Drops file in Windows directory
PID:4952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE88⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"89⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE90⤵
- Checks computer location settings
- Modifies registry class
PID:1384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"91⤵
- System Location Discovery: System Language Discovery
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE92⤵
- System Location Discovery: System Language Discovery
PID:720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"93⤵
- System Location Discovery: System Language Discovery
PID:3768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE94⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"95⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE96⤵PID:3224
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"97⤵
- Drops file in Windows directory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE98⤵
- Drops file in Windows directory
PID:1816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"99⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE100⤵
- Checks computer location settings
PID:4100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"101⤵PID:3476
-
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE102⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"103⤵PID:4444
-
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE104⤵
- Drops file in Windows directory
PID:3012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"105⤵PID:3136
-
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE106⤵PID:4048
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"107⤵
- System Location Discovery: System Language Discovery
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE108⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"109⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE110⤵
- Checks computer location settings
PID:4676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"111⤵
- Drops file in Windows directory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE112⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"113⤵
- Drops file in Windows directory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE114⤵PID:3948
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"115⤵
- System Location Discovery: System Language Discovery
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE116⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE118⤵
- Modifies registry class
PID:2512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"119⤵PID:4868
-
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE120⤵
- Checks computer location settings
- Modifies registry class
PID:1692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE"121⤵PID:4012
-
C:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\98FB78~1.EXE122⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:116
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-