Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 04:25
Behavioral task
behavioral1
Sample
f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe
Resource
win10v2004-20241007-en
General
-
Target
f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe
-
Size
6.9MB
-
MD5
18719c6cbf0bd5fa2c6a1db3da4259f0
-
SHA1
5def71b31ede252620c75a40fb308d4a4a1d448f
-
SHA256
f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8
-
SHA512
8a16809d454b5d6e90fc9b4a13b4418996d16518e55019ac7665ed9ddc277724b1e9859c17210df34fa659d0e72041fd5c882b2eaacfafb8f5bbe1ce5d14ba9c
-
SSDEEP
196608:S9OaQ54oYY7jLwXjZ41OON2uk3bQWgtyccMEL:Nz5x7jLXkmkU4cFe
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0008000000023c82-4.dat family_neshta behavioral2/files/0x0007000000023c87-11.dat family_neshta behavioral2/memory/4236-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3412-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4060-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3316-39-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002035f-42.dat family_neshta behavioral2/files/0x000700000002029a-45.dat family_neshta behavioral2/files/0x000600000002023a-48.dat family_neshta behavioral2/files/0x0006000000020232-47.dat family_neshta behavioral2/files/0x0006000000020249-72.dat family_neshta behavioral2/memory/1688-75-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2176-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020351-51.dat family_neshta behavioral2/files/0x00010000000214f7-93.dat family_neshta behavioral2/memory/5040-112-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f8e-117.dat family_neshta behavioral2/files/0x00010000000167ff-119.dat family_neshta behavioral2/files/0x000200000001dbc7-137.dat family_neshta behavioral2/files/0x0001000000022e90-162.dat family_neshta behavioral2/memory/3052-164-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00020000000215e5-168.dat family_neshta behavioral2/files/0x000200000000072b-167.dat family_neshta behavioral2/files/0x000500000001e8d9-177.dat family_neshta behavioral2/files/0x0001000000022e8c-161.dat family_neshta behavioral2/files/0x0001000000016910-144.dat family_neshta behavioral2/files/0x0001000000016914-143.dat family_neshta behavioral2/files/0x00010000000167c0-136.dat family_neshta behavioral2/files/0x00010000000167e6-135.dat family_neshta behavioral2/files/0x000300000001e8e0-194.dat family_neshta behavioral2/files/0x000e00000001f3d6-196.dat family_neshta behavioral2/memory/2812-208-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4456-197-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000001e6d2-195.dat family_neshta behavioral2/files/0x000300000001e88f-193.dat family_neshta behavioral2/files/0x000500000001e0b8-192.dat family_neshta behavioral2/files/0x000a00000001e81d-191.dat family_neshta behavioral2/files/0x000b00000001ee17-190.dat family_neshta behavioral2/files/0x000b00000001e620-189.dat family_neshta behavioral2/memory/2056-130-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167ad-120.dat family_neshta behavioral2/files/0x0001000000022f90-116.dat family_neshta behavioral2/files/0x00010000000214f5-90.dat family_neshta behavioral2/memory/4748-86-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3808-220-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3200-209-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4500-221-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2608-229-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3968-230-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3240-237-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4528-238-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1712-240-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2900-246-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2432-253-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4444-254-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4964-256-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/8-262-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2372-267-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4900-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3236-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3680-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1428-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3020-286-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3820-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation F3F038~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 4736 f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe 4236 svchost.com 3412 F3F038~1.EXE 4060 svchost.com 3316 F3F038~1.EXE 2176 svchost.com 1688 F3F038~1.EXE 4748 svchost.com 5040 F3F038~1.EXE 2056 svchost.com 3052 F3F038~1.EXE 4456 svchost.com 2812 F3F038~1.EXE 3200 svchost.com 3808 F3F038~1.EXE 4500 svchost.com 2608 F3F038~1.EXE 3968 svchost.com 3240 F3F038~1.EXE 4528 svchost.com 1712 F3F038~1.EXE 2900 svchost.com 2432 F3F038~1.EXE 4444 svchost.com 4964 F3F038~1.EXE 8 svchost.com 2372 F3F038~1.EXE 4900 svchost.com 3236 F3F038~1.EXE 3680 svchost.com 1428 F3F038~1.EXE 3020 svchost.com 3820 F3F038~1.EXE 1272 svchost.com 4872 F3F038~1.EXE 3600 svchost.com 4888 F3F038~1.EXE 4520 svchost.com 112 F3F038~1.EXE 5040 svchost.com 4176 F3F038~1.EXE 1928 svchost.com 4144 F3F038~1.EXE 4680 svchost.com 4932 F3F038~1.EXE 3052 svchost.com 3488 F3F038~1.EXE 2280 svchost.com 228 F3F038~1.EXE 3788 svchost.com 4820 F3F038~1.EXE 1924 svchost.com 2844 F3F038~1.EXE 232 svchost.com 1696 F3F038~1.EXE 2916 svchost.com 5108 F3F038~1.EXE 3384 svchost.com 4504 F3F038~1.EXE 3044 svchost.com 2448 F3F038~1.EXE 3140 svchost.com 2492 F3F038~1.EXE 4152 svchost.com -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" F3F038~1.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe F3F038~1.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe F3F038~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe F3F038~1.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe F3F038~1.EXE File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe F3F038~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe F3F038~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe F3F038~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys F3F038~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F3F038~1.EXE File opened for modification C:\Windows\directx.sys F3F038~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F3F038~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F3F038~1.EXE File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F3F038~1.EXE File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\directx.sys F3F038~1.EXE File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F3F038~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\directx.sys F3F038~1.EXE File opened for modification C:\Windows\directx.sys F3F038~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F3F038~1.EXE File opened for modification C:\Windows\svchost.com F3F038~1.EXE File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F3F038~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings F3F038~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 664 wrote to memory of 4736 664 f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe 83 PID 664 wrote to memory of 4736 664 f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe 83 PID 664 wrote to memory of 4736 664 f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe 83 PID 4736 wrote to memory of 4236 4736 f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe 84 PID 4736 wrote to memory of 4236 4736 f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe 84 PID 4736 wrote to memory of 4236 4736 f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe 84 PID 4236 wrote to memory of 3412 4236 svchost.com 85 PID 4236 wrote to memory of 3412 4236 svchost.com 85 PID 4236 wrote to memory of 3412 4236 svchost.com 85 PID 3412 wrote to memory of 4060 3412 F3F038~1.EXE 86 PID 3412 wrote to memory of 4060 3412 F3F038~1.EXE 86 PID 3412 wrote to memory of 4060 3412 F3F038~1.EXE 86 PID 4060 wrote to memory of 3316 4060 svchost.com 87 PID 4060 wrote to memory of 3316 4060 svchost.com 87 PID 4060 wrote to memory of 3316 4060 svchost.com 87 PID 3316 wrote to memory of 2176 3316 F3F038~1.EXE 88 PID 3316 wrote to memory of 2176 3316 F3F038~1.EXE 88 PID 3316 wrote to memory of 2176 3316 F3F038~1.EXE 88 PID 2176 wrote to memory of 1688 2176 svchost.com 89 PID 2176 wrote to memory of 1688 2176 svchost.com 89 PID 2176 wrote to memory of 1688 2176 svchost.com 89 PID 1688 wrote to memory of 4748 1688 F3F038~1.EXE 90 PID 1688 wrote to memory of 4748 1688 F3F038~1.EXE 90 PID 1688 wrote to memory of 4748 1688 F3F038~1.EXE 90 PID 4748 wrote to memory of 5040 4748 svchost.com 164 PID 4748 wrote to memory of 5040 4748 svchost.com 164 PID 4748 wrote to memory of 5040 4748 svchost.com 164 PID 5040 wrote to memory of 2056 5040 F3F038~1.EXE 92 PID 5040 wrote to memory of 2056 5040 F3F038~1.EXE 92 PID 5040 wrote to memory of 2056 5040 F3F038~1.EXE 92 PID 2056 wrote to memory of 3052 2056 svchost.com 128 PID 2056 wrote to memory of 3052 2056 svchost.com 128 PID 2056 wrote to memory of 3052 2056 svchost.com 128 PID 3052 wrote to memory of 4456 3052 F3F038~1.EXE 94 PID 3052 wrote to memory of 4456 3052 F3F038~1.EXE 94 PID 3052 wrote to memory of 4456 3052 F3F038~1.EXE 94 PID 4456 wrote to memory of 2812 4456 svchost.com 95 PID 4456 wrote to memory of 2812 4456 svchost.com 95 PID 4456 wrote to memory of 2812 4456 svchost.com 95 PID 2812 wrote to memory of 3200 2812 F3F038~1.EXE 96 PID 2812 wrote to memory of 3200 2812 F3F038~1.EXE 96 PID 2812 wrote to memory of 3200 2812 F3F038~1.EXE 96 PID 3200 wrote to memory of 3808 3200 svchost.com 97 PID 3200 wrote to memory of 3808 3200 svchost.com 97 PID 3200 wrote to memory of 3808 3200 svchost.com 97 PID 3808 wrote to memory of 4500 3808 F3F038~1.EXE 98 PID 3808 wrote to memory of 4500 3808 F3F038~1.EXE 98 PID 3808 wrote to memory of 4500 3808 F3F038~1.EXE 98 PID 4500 wrote to memory of 2608 4500 svchost.com 99 PID 4500 wrote to memory of 2608 4500 svchost.com 99 PID 4500 wrote to memory of 2608 4500 svchost.com 99 PID 2608 wrote to memory of 3968 2608 F3F038~1.EXE 100 PID 2608 wrote to memory of 3968 2608 F3F038~1.EXE 100 PID 2608 wrote to memory of 3968 2608 F3F038~1.EXE 100 PID 3968 wrote to memory of 3240 3968 svchost.com 101 PID 3968 wrote to memory of 3240 3968 svchost.com 101 PID 3968 wrote to memory of 3240 3968 svchost.com 101 PID 3240 wrote to memory of 4528 3240 F3F038~1.EXE 102 PID 3240 wrote to memory of 4528 3240 F3F038~1.EXE 102 PID 3240 wrote to memory of 4528 3240 F3F038~1.EXE 102 PID 4528 wrote to memory of 1712 4528 svchost.com 103 PID 4528 wrote to memory of 1712 4528 svchost.com 103 PID 4528 wrote to memory of 1712 4528 svchost.com 103 PID 1712 wrote to memory of 2900 1712 F3F038~1.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe"C:\Users\Admin\AppData\Local\Temp\f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Users\Admin\AppData\Local\Temp\3582-490\f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\f3f0383273316e88023ceccf908bf0ae1043f4d789b99b19b22da3508695ded8N.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"11⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE20⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"23⤵
- Executes dropped EXE
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE24⤵
- Executes dropped EXE
PID:2432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"25⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:8 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"33⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"35⤵
- Executes dropped EXE
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"39⤵
- Executes dropped EXE
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE40⤵
- Executes dropped EXE
PID:112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"41⤵
- Executes dropped EXE
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
PID:4176 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"43⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4144 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"45⤵
- Executes dropped EXE
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE48⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"49⤵
- Executes dropped EXE
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"51⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE54⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:232 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE56⤵
- Executes dropped EXE
PID:1696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"57⤵
- Executes dropped EXE
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:5108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"59⤵
- Executes dropped EXE
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
PID:4504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"63⤵
- Executes dropped EXE
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"65⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE66⤵
- Drops file in Windows directory
- Modifies registry class
PID:5004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"67⤵PID:4956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE68⤵PID:4984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"69⤵
- System Location Discovery: System Language Discovery
PID:3852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE70⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:3628 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"71⤵
- System Location Discovery: System Language Discovery
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE72⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"73⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE74⤵
- Modifies registry class
PID:2652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"75⤵PID:4732
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE76⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE78⤵PID:3928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"79⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE80⤵
- Modifies registry class
PID:4556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"81⤵
- System Location Discovery: System Language Discovery
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE82⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"83⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE84⤵
- Checks computer location settings
PID:3544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"85⤵
- Drops file in Windows directory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE86⤵
- Checks computer location settings
- Modifies registry class
PID:4156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"87⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE88⤵
- Checks computer location settings
- Modifies registry class
PID:880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"89⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3456 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE90⤵
- Modifies registry class
PID:1076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"91⤵
- Drops file in Windows directory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE92⤵
- Checks computer location settings
- Modifies registry class
PID:3488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"93⤵
- Drops file in Windows directory
PID:64 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE94⤵
- Checks computer location settings
- Drops file in Windows directory
PID:316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"95⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE96⤵
- Checks computer location settings
- Modifies registry class
PID:1908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"97⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE98⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"99⤵PID:232
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE100⤵
- Modifies registry class
PID:4508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"101⤵PID:388
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE102⤵
- Checks computer location settings
- Modifies registry class
PID:3528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"103⤵
- System Location Discovery: System Language Discovery
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE104⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"105⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE106⤵
- Modifies registry class
PID:4516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"107⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE108⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"109⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE110⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"111⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE112⤵
- Checks computer location settings
- Modifies registry class
PID:3764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"113⤵PID:3144
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE114⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"115⤵PID:3332
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE116⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE118⤵PID:868
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"119⤵PID:4960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE120⤵PID:2068
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE"121⤵PID:3828
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F3F038~1.EXE122⤵
- Checks computer location settings
PID:3944
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-