Analysis
-
max time kernel
31s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
17-12-2024 08:18
Behavioral task
behavioral1
Sample
f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe
Resource
win10v2004-20241007-en
General
-
Target
f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe
-
Size
4.0MB
-
MD5
b74870add31c96ba25ccc10ea42f8dd0
-
SHA1
ec768f12f7bb8446cfeec207e73224cd42e8ed45
-
SHA256
f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118
-
SHA512
1e1816d1fd2a6c1e1525a57439aaf0549b720e0dabfeb7d6584054f2d8c705e40e5294836ab6164b6f9b0504209ab6679a28b63f40140fa5e67148612fd7a27c
-
SSDEEP
49152:vDKt5jqtb72StuLh5cyqHo+oDc+HTst7R39JM9wWAToTCN7x/:L5KLhvN+ooV3ASWQ71
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral1/files/0x0008000000016cf0-6.dat family_neshta behavioral1/files/0x0007000000016d0c-20.dat family_neshta behavioral1/files/0x0001000000010314-19.dat family_neshta behavioral1/files/0x0001000000010312-18.dat family_neshta behavioral1/files/0x0005000000010351-17.dat family_neshta behavioral1/files/0x0002000000010484-16.dat family_neshta behavioral1/memory/2140-31-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2816-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1644-47-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2120-48-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2760-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2616-55-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2604-69-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2240-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2904-91-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2188-90-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2272-96-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2920-95-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2976-111-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/772-110-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x000100000000f7d8-122.dat family_neshta behavioral1/files/0x000100000000f708-135.dat family_neshta behavioral1/files/0x000100000000f7cf-131.dat family_neshta behavioral1/files/0x000100000000f77b-130.dat family_neshta behavioral1/files/0x000100000000f7dd-129.dat family_neshta behavioral1/files/0x000100000000f7eb-132.dat family_neshta behavioral1/memory/1676-151-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2072-150-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2204-163-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3016-162-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1196-185-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1180-184-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1956-195-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1484-194-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2012-210-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2432-209-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2328-230-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/572-229-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2540-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1704-254-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/856-266-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2300-267-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2700-275-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2872-274-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3036-291-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2876-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2852-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1688-302-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2652-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2660-314-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2696-323-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2900-322-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2024-329-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2936-332-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2920-331-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2916-340-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1640-339-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/516-348-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2820-347-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2200-356-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2216-355-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2508-364-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2280-363-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1248-371-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 2532 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 2140 svchost.com 2816 F095ED~1.EXE 1644 svchost.com 2120 F095ED~1.EXE 2616 svchost.com 2760 F095ED~1.EXE 2604 svchost.com 2240 F095ED~1.EXE 2188 svchost.com 2904 F095ED~1.EXE 2272 svchost.com 2920 F095ED~1.EXE 2976 svchost.com 772 F095ED~1.EXE 1676 svchost.com 2072 F095ED~1.EXE 2204 svchost.com 3016 F095ED~1.EXE 1196 svchost.com 1180 F095ED~1.EXE 1956 svchost.com 1484 F095ED~1.EXE 2432 svchost.com 2012 F095ED~1.EXE 2328 svchost.com 572 F095ED~1.EXE 2540 svchost.com 1704 F095ED~1.EXE 2300 svchost.com 856 F095ED~1.EXE 2700 svchost.com 2872 F095ED~1.EXE 2876 svchost.com 3036 F095ED~1.EXE 2852 svchost.com 1688 F095ED~1.EXE 2660 svchost.com 2652 F095ED~1.EXE 2900 svchost.com 2696 F095ED~1.EXE 2936 svchost.com 2920 F095ED~1.EXE 2916 svchost.com 1640 F095ED~1.EXE 516 svchost.com 2820 F095ED~1.EXE 2200 svchost.com 2216 F095ED~1.EXE 2508 svchost.com 2280 F095ED~1.EXE 2792 svchost.com 1248 F095ED~1.EXE 3020 svchost.com 844 F095ED~1.EXE 1612 svchost.com 1160 F095ED~1.EXE 628 svchost.com 872 F095ED~1.EXE 932 svchost.com 2004 F095ED~1.EXE 2400 svchost.com 2384 F095ED~1.EXE 2432 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 2024 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 2024 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 2140 svchost.com 2140 svchost.com 1644 svchost.com 1644 svchost.com 2616 svchost.com 2616 svchost.com 2604 svchost.com 2604 svchost.com 2188 svchost.com 2188 svchost.com 2272 svchost.com 2272 svchost.com 2976 svchost.com 2976 svchost.com 1676 svchost.com 1676 svchost.com 2024 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 2532 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 2532 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 2532 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 2204 svchost.com 2204 svchost.com 1196 svchost.com 1196 svchost.com 2024 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 1956 svchost.com 1956 svchost.com 2432 svchost.com 2432 svchost.com 2328 svchost.com 2328 svchost.com 2540 svchost.com 2540 svchost.com 2300 svchost.com 2300 svchost.com 2532 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 2700 svchost.com 2700 svchost.com 2876 svchost.com 2876 svchost.com 2852 svchost.com 2852 svchost.com 2660 svchost.com 2660 svchost.com 2900 svchost.com 2900 svchost.com 2936 svchost.com 2936 svchost.com 2916 svchost.com 2916 svchost.com 516 svchost.com 516 svchost.com 2200 svchost.com 2200 svchost.com 2508 svchost.com 2508 svchost.com 2792 svchost.com 2792 svchost.com 3020 svchost.com 3020 svchost.com 1612 svchost.com 1612 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpconfig.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CLVIEW.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOF5E2~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com F095ED~1.EXE File opened for modification C:\Windows\directx.sys F095ED~1.EXE File opened for modification C:\Windows\svchost.com F095ED~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F095ED~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2532 2024 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 31 PID 2024 wrote to memory of 2532 2024 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 31 PID 2024 wrote to memory of 2532 2024 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 31 PID 2024 wrote to memory of 2532 2024 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 31 PID 2532 wrote to memory of 2140 2532 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 32 PID 2532 wrote to memory of 2140 2532 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 32 PID 2532 wrote to memory of 2140 2532 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 32 PID 2532 wrote to memory of 2140 2532 f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe 32 PID 2140 wrote to memory of 2816 2140 svchost.com 33 PID 2140 wrote to memory of 2816 2140 svchost.com 33 PID 2140 wrote to memory of 2816 2140 svchost.com 33 PID 2140 wrote to memory of 2816 2140 svchost.com 33 PID 2816 wrote to memory of 1644 2816 F095ED~1.EXE 34 PID 2816 wrote to memory of 1644 2816 F095ED~1.EXE 34 PID 2816 wrote to memory of 1644 2816 F095ED~1.EXE 34 PID 2816 wrote to memory of 1644 2816 F095ED~1.EXE 34 PID 1644 wrote to memory of 2120 1644 svchost.com 35 PID 1644 wrote to memory of 2120 1644 svchost.com 35 PID 1644 wrote to memory of 2120 1644 svchost.com 35 PID 1644 wrote to memory of 2120 1644 svchost.com 35 PID 2120 wrote to memory of 2616 2120 F095ED~1.EXE 36 PID 2120 wrote to memory of 2616 2120 F095ED~1.EXE 36 PID 2120 wrote to memory of 2616 2120 F095ED~1.EXE 36 PID 2120 wrote to memory of 2616 2120 F095ED~1.EXE 36 PID 2616 wrote to memory of 2760 2616 svchost.com 37 PID 2616 wrote to memory of 2760 2616 svchost.com 37 PID 2616 wrote to memory of 2760 2616 svchost.com 37 PID 2616 wrote to memory of 2760 2616 svchost.com 37 PID 2760 wrote to memory of 2604 2760 F095ED~1.EXE 38 PID 2760 wrote to memory of 2604 2760 F095ED~1.EXE 38 PID 2760 wrote to memory of 2604 2760 F095ED~1.EXE 38 PID 2760 wrote to memory of 2604 2760 F095ED~1.EXE 38 PID 2604 wrote to memory of 2240 2604 svchost.com 39 PID 2604 wrote to memory of 2240 2604 svchost.com 39 PID 2604 wrote to memory of 2240 2604 svchost.com 39 PID 2604 wrote to memory of 2240 2604 svchost.com 39 PID 2240 wrote to memory of 2188 2240 F095ED~1.EXE 40 PID 2240 wrote to memory of 2188 2240 F095ED~1.EXE 40 PID 2240 wrote to memory of 2188 2240 F095ED~1.EXE 40 PID 2240 wrote to memory of 2188 2240 F095ED~1.EXE 40 PID 2188 wrote to memory of 2904 2188 svchost.com 118 PID 2188 wrote to memory of 2904 2188 svchost.com 118 PID 2188 wrote to memory of 2904 2188 svchost.com 118 PID 2188 wrote to memory of 2904 2188 svchost.com 118 PID 2904 wrote to memory of 2272 2904 F095ED~1.EXE 42 PID 2904 wrote to memory of 2272 2904 F095ED~1.EXE 42 PID 2904 wrote to memory of 2272 2904 F095ED~1.EXE 42 PID 2904 wrote to memory of 2272 2904 F095ED~1.EXE 42 PID 2272 wrote to memory of 2920 2272 svchost.com 164 PID 2272 wrote to memory of 2920 2272 svchost.com 164 PID 2272 wrote to memory of 2920 2272 svchost.com 164 PID 2272 wrote to memory of 2920 2272 svchost.com 164 PID 2920 wrote to memory of 2976 2920 F095ED~1.EXE 44 PID 2920 wrote to memory of 2976 2920 F095ED~1.EXE 44 PID 2920 wrote to memory of 2976 2920 F095ED~1.EXE 44 PID 2920 wrote to memory of 2976 2920 F095ED~1.EXE 44 PID 2976 wrote to memory of 772 2976 svchost.com 45 PID 2976 wrote to memory of 772 2976 svchost.com 45 PID 2976 wrote to memory of 772 2976 svchost.com 45 PID 2976 wrote to memory of 772 2976 svchost.com 45 PID 772 wrote to memory of 1676 772 F095ED~1.EXE 127 PID 772 wrote to memory of 1676 772 F095ED~1.EXE 127 PID 772 wrote to memory of 1676 772 F095ED~1.EXE 127 PID 772 wrote to memory of 1676 772 F095ED~1.EXE 127
Processes
-
C:\Users\Admin\AppData\Local\Temp\f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe"C:\Users\Admin\AppData\Local\Temp\f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\f095edd3423076f157d82bf869f709baa7bc272620d4245b3e035282726ee118N.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE18⤵
- Executes dropped EXE
PID:2072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE20⤵
- Executes dropped EXE
PID:3016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE24⤵
- Executes dropped EXE
PID:1484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE26⤵
- Executes dropped EXE
PID:2012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2328 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE28⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE30⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE32⤵
- Executes dropped EXE
PID:856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE34⤵
- Executes dropped EXE
PID:2872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE36⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE38⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE40⤵
- Executes dropped EXE
PID:2652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE44⤵
- Executes dropped EXE
PID:2920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE48⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE52⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE56⤵
- Executes dropped EXE
PID:844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1160 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"59⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE60⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"61⤵
- Executes dropped EXE
PID:932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE62⤵
- Executes dropped EXE
PID:2004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"63⤵
- Executes dropped EXE
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE64⤵
- Executes dropped EXE
PID:2384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"65⤵
- Executes dropped EXE
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE66⤵PID:1732
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE68⤵PID:2088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"69⤵
- Drops file in Windows directory
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE70⤵
- Drops file in Windows directory
PID:1216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"71⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE72⤵PID:1124
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE74⤵PID:2476
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE76⤵PID:2800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"77⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE78⤵PID:2748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"79⤵PID:2848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE80⤵PID:2788
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"81⤵
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE82⤵PID:2288
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"83⤵
- Drops file in Windows directory
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE84⤵
- System Location Discovery: System Language Discovery
PID:1912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"85⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE86⤵PID:2608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"87⤵
- Drops file in Windows directory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE88⤵PID:2956
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"89⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE90⤵PID:2996
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"91⤵
- Drops file in Windows directory
PID:520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE92⤵
- Drops file in Windows directory
PID:1884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"93⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE94⤵PID:2932
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"95⤵
- Drops file in Windows directory
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE96⤵PID:2304
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"97⤵
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE98⤵PID:1676
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"99⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE100⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"101⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE102⤵PID:2292
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"103⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE104⤵
- System Location Discovery: System Language Discovery
PID:1148 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"105⤵
- Drops file in Windows directory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE106⤵
- Drops file in Windows directory
PID:872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"107⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE108⤵PID:1956
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"109⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE110⤵PID:1792
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"111⤵PID:1712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE112⤵
- Drops file in Windows directory
PID:1464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"113⤵PID:2468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE114⤵
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"115⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE116⤵PID:1396
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE118⤵
- Drops file in Windows directory
PID:1596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"119⤵
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE120⤵
- Drops file in Windows directory
PID:2476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE"121⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\F095ED~1.EXE122⤵PID:2800
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-