Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 10:01
Behavioral task
behavioral1
Sample
25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe
Resource
win10v2004-20241007-en
General
-
Target
25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe
-
Size
6.0MB
-
MD5
174f775dd87640662954782a36a2ef10
-
SHA1
69dd7f4349caf7fbd4c3d1217af3b2a672a8f24c
-
SHA256
25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fc
-
SHA512
354eb11b0f9e457b701943767ecedfeb59bed1451f5b8614ea8810a2cf655ee2c8b4c9add98793df648c12ae451b2917b8ed1253524e845e4559b71806e09d6b
-
SSDEEP
98304:ln2pTIB5ICr7WUrkTj+vsW/Lzmma7CLP+LZU:R2p88IrvsW/LzJa7CT+LZU
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000c000000023b79-4.dat family_neshta behavioral2/files/0x000a000000023b82-10.dat family_neshta behavioral2/memory/3068-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4652-20-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3688-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1568-38-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020348-42.dat family_neshta behavioral2/files/0x0006000000020223-48.dat family_neshta behavioral2/files/0x000600000002021b-46.dat family_neshta behavioral2/files/0x000100000002022a-53.dat family_neshta behavioral2/files/0x000400000002033b-57.dat family_neshta behavioral2/memory/1808-77-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/212-89-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2944-78-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000020294-64.dat family_neshta behavioral2/files/0x000400000002034d-63.dat family_neshta behavioral2/memory/1144-55-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002033a-50.dat family_neshta behavioral2/files/0x0007000000020283-45.dat family_neshta behavioral2/files/0x00010000000214e1-107.dat family_neshta behavioral2/files/0x0001000000022f41-110.dat family_neshta behavioral2/files/0x0001000000022f80-117.dat family_neshta behavioral2/files/0x00010000000167fd-121.dat family_neshta behavioral2/files/0x00010000000167c6-126.dat family_neshta behavioral2/files/0x00010000000167ab-125.dat family_neshta behavioral2/files/0x000100000001dbca-139.dat family_neshta behavioral2/files/0x0001000000016912-149.dat family_neshta behavioral2/files/0x00010000000214e0-106.dat family_neshta behavioral2/files/0x00010000000214df-105.dat family_neshta behavioral2/files/0x000300000001e8bb-161.dat family_neshta behavioral2/files/0x000b00000001edf9-166.dat family_neshta behavioral2/files/0x000600000001db5f-158.dat family_neshta behavioral2/files/0x00010000000228e4-172.dat family_neshta behavioral2/memory/2184-175-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000200000000072b-189.dat family_neshta behavioral2/files/0x000500000001e8b4-201.dat family_neshta behavioral2/files/0x000b00000001e610-200.dat family_neshta behavioral2/files/0x000e00000001f3b9-199.dat family_neshta behavioral2/files/0x000500000001e6a9-198.dat family_neshta behavioral2/files/0x000300000001e86a-197.dat family_neshta behavioral2/files/0x000b00000001e7fa-196.dat family_neshta behavioral2/files/0x00020000000215d2-188.dat family_neshta behavioral2/memory/3808-185-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1548-202-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2260-213-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1952-214-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/636-218-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2220-225-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/412-227-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1384-233-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4944-235-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3100-241-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1620-243-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4692-249-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1036-254-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4792-257-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/852-264-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3104-265-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2308-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2072-273-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4224-275-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1372-281-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3364-283-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2148-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 250292~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe -
Executes dropped EXE 64 IoCs
pid Process 4072 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe 3068 svchost.com 4652 250292~1.EXE 3688 svchost.com 1568 250292~1.EXE 1144 svchost.com 1808 250292~1.EXE 2944 svchost.com 212 250292~1.EXE 2184 svchost.com 3808 250292~1.EXE 1548 svchost.com 2260 250292~1.EXE 1952 svchost.com 636 250292~1.EXE 2220 svchost.com 412 250292~1.EXE 1384 svchost.com 4944 250292~1.EXE 3100 svchost.com 1620 250292~1.EXE 4692 svchost.com 1036 250292~1.EXE 4792 svchost.com 852 250292~1.EXE 3104 svchost.com 2308 250292~1.EXE 2072 svchost.com 4224 250292~1.EXE 1372 svchost.com 3364 250292~1.EXE 2148 svchost.com 1820 250292~1.EXE 1568 svchost.com 5000 250292~1.EXE 4404 svchost.com 3792 250292~1.EXE 2000 svchost.com 1708 250292~1.EXE 116 svchost.com 756 250292~1.EXE 2396 svchost.com 4412 250292~1.EXE 3264 svchost.com 4848 250292~1.EXE 2352 svchost.com 3660 250292~1.EXE 2952 svchost.com 4676 250292~1.EXE 3804 svchost.com 3852 250292~1.EXE 1976 svchost.com 4988 250292~1.EXE 2644 svchost.com 3024 250292~1.EXE 2960 svchost.com 2220 250292~1.EXE 4372 svchost.com 1384 250292~1.EXE 4944 svchost.com 4108 250292~1.EXE 3488 svchost.com 4488 250292~1.EXE 1900 svchost.com -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 250292~1.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 250292~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 250292~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 250292~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 250292~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 250292~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\directx.sys 250292~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 250292~1.EXE File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\directx.sys 250292~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 250292~1.EXE File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 250292~1.EXE File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 250292~1.EXE File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\directx.sys 250292~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 250292~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 250292~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 250292~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 250292~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4928 wrote to memory of 4072 4928 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe 82 PID 4928 wrote to memory of 4072 4928 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe 82 PID 4928 wrote to memory of 4072 4928 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe 82 PID 4072 wrote to memory of 3068 4072 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe 83 PID 4072 wrote to memory of 3068 4072 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe 83 PID 4072 wrote to memory of 3068 4072 25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe 83 PID 3068 wrote to memory of 4652 3068 svchost.com 84 PID 3068 wrote to memory of 4652 3068 svchost.com 84 PID 3068 wrote to memory of 4652 3068 svchost.com 84 PID 4652 wrote to memory of 3688 4652 250292~1.EXE 85 PID 4652 wrote to memory of 3688 4652 250292~1.EXE 85 PID 4652 wrote to memory of 3688 4652 250292~1.EXE 85 PID 3688 wrote to memory of 1568 3688 svchost.com 86 PID 3688 wrote to memory of 1568 3688 svchost.com 86 PID 3688 wrote to memory of 1568 3688 svchost.com 86 PID 1568 wrote to memory of 1144 1568 250292~1.EXE 87 PID 1568 wrote to memory of 1144 1568 250292~1.EXE 87 PID 1568 wrote to memory of 1144 1568 250292~1.EXE 87 PID 1144 wrote to memory of 1808 1144 svchost.com 88 PID 1144 wrote to memory of 1808 1144 svchost.com 88 PID 1144 wrote to memory of 1808 1144 svchost.com 88 PID 1808 wrote to memory of 2944 1808 250292~1.EXE 89 PID 1808 wrote to memory of 2944 1808 250292~1.EXE 89 PID 1808 wrote to memory of 2944 1808 250292~1.EXE 89 PID 2944 wrote to memory of 212 2944 svchost.com 90 PID 2944 wrote to memory of 212 2944 svchost.com 90 PID 2944 wrote to memory of 212 2944 svchost.com 90 PID 212 wrote to memory of 2184 212 250292~1.EXE 91 PID 212 wrote to memory of 2184 212 250292~1.EXE 91 PID 212 wrote to memory of 2184 212 250292~1.EXE 91 PID 2184 wrote to memory of 3808 2184 svchost.com 92 PID 2184 wrote to memory of 3808 2184 svchost.com 92 PID 2184 wrote to memory of 3808 2184 svchost.com 92 PID 3808 wrote to memory of 1548 3808 250292~1.EXE 93 PID 3808 wrote to memory of 1548 3808 250292~1.EXE 93 PID 3808 wrote to memory of 1548 3808 250292~1.EXE 93 PID 1548 wrote to memory of 2260 1548 svchost.com 94 PID 1548 wrote to memory of 2260 1548 svchost.com 94 PID 1548 wrote to memory of 2260 1548 svchost.com 94 PID 2260 wrote to memory of 1952 2260 250292~1.EXE 95 PID 2260 wrote to memory of 1952 2260 250292~1.EXE 95 PID 2260 wrote to memory of 1952 2260 250292~1.EXE 95 PID 1952 wrote to memory of 636 1952 svchost.com 96 PID 1952 wrote to memory of 636 1952 svchost.com 96 PID 1952 wrote to memory of 636 1952 svchost.com 96 PID 636 wrote to memory of 2220 636 250292~1.EXE 138 PID 636 wrote to memory of 2220 636 250292~1.EXE 138 PID 636 wrote to memory of 2220 636 250292~1.EXE 138 PID 2220 wrote to memory of 412 2220 svchost.com 98 PID 2220 wrote to memory of 412 2220 svchost.com 98 PID 2220 wrote to memory of 412 2220 svchost.com 98 PID 412 wrote to memory of 1384 412 250292~1.EXE 140 PID 412 wrote to memory of 1384 412 250292~1.EXE 140 PID 412 wrote to memory of 1384 412 250292~1.EXE 140 PID 1384 wrote to memory of 4944 1384 svchost.com 141 PID 1384 wrote to memory of 4944 1384 svchost.com 141 PID 1384 wrote to memory of 4944 1384 svchost.com 141 PID 4944 wrote to memory of 3100 4944 250292~1.EXE 101 PID 4944 wrote to memory of 3100 4944 250292~1.EXE 101 PID 4944 wrote to memory of 3100 4944 250292~1.EXE 101 PID 3100 wrote to memory of 1620 3100 svchost.com 102 PID 3100 wrote to memory of 1620 3100 svchost.com 102 PID 3100 wrote to memory of 1620 3100 svchost.com 102 PID 1620 wrote to memory of 4692 1620 250292~1.EXE 194
Processes
-
C:\Users\Admin\AppData\Local\Temp\25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe"C:\Users\Admin\AppData\Local\Temp\25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\25029227bd78160534f9662e402690a90741824dbe6bcda1c5935a4e83b1e4fcN.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"15⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"23⤵
- Executes dropped EXE
PID:4692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE24⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"25⤵
- Executes dropped EXE
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"29⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE32⤵
- Executes dropped EXE
PID:3364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"33⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE34⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"35⤵
- Executes dropped EXE
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"37⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
PID:3792 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"41⤵
- Executes dropped EXE
PID:116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"45⤵
- Executes dropped EXE
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"47⤵
- Executes dropped EXE
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE48⤵
- Executes dropped EXE
PID:3660 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"49⤵
- Executes dropped EXE
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"51⤵
- Executes dropped EXE
PID:3804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE52⤵
- Executes dropped EXE
PID:3852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"53⤵
- Executes dropped EXE
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"55⤵
- Executes dropped EXE
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE60⤵
- Executes dropped EXE
PID:1384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"61⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE62⤵
- Executes dropped EXE
PID:4108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"63⤵
- Executes dropped EXE
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE64⤵
- Executes dropped EXE
- Modifies registry class
PID:4488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"65⤵
- Executes dropped EXE
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE66⤵
- Drops file in Windows directory
PID:4932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"67⤵PID:4380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE68⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2200 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"69⤵
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE70⤵PID:4116
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"71⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE72⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
PID:1792 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE74⤵
- Modifies registry class
PID:1872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"75⤵
- Drops file in Windows directory
PID:368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE76⤵
- System Location Discovery: System Language Discovery
PID:4376 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"77⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE78⤵PID:3640
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"79⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE80⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:4404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"81⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE82⤵
- System Location Discovery: System Language Discovery
PID:2156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"83⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE84⤵PID:2112
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"85⤵PID:116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE86⤵PID:64
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"87⤵
- System Location Discovery: System Language Discovery
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE88⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"89⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE90⤵PID:1604
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"91⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE92⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"93⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE94⤵PID:3416
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"95⤵PID:4700
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE96⤵
- Checks computer location settings
- Modifies registry class
PID:2936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"97⤵
- Drops file in Windows directory
PID:3964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE98⤵PID:2740
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"99⤵PID:4032
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE100⤵
- Checks computer location settings
- Modifies registry class
PID:2604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"101⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE102⤵
- Checks computer location settings
PID:952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"103⤵PID:4996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE104⤵
- System Location Discovery: System Language Discovery
PID:3740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"105⤵
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE106⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"107⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE108⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"109⤵
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE110⤵PID:388
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"111⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE112⤵PID:4108
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"113⤵PID:4548
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE114⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"115⤵PID:4816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE116⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"117⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE118⤵
- Checks computer location settings
- Modifies registry class
PID:4304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"119⤵
- Drops file in Windows directory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE120⤵
- Checks computer location settings
PID:4428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE"121⤵
- System Location Discovery: System Language Discovery
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\250292~1.EXE122⤵PID:2744
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-