Analysis
-
max time kernel
39s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 22:15
Behavioral task
behavioral1
Sample
70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe
Resource
win7-20240708-en
General
-
Target
70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe
-
Size
3.9MB
-
MD5
c52d4fb4a49b05a1f665d2b9a4bb42ad
-
SHA1
4165fc93089a1b3517088db400963df219af05d3
-
SHA256
70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e
-
SHA512
a312ede14b3a771d75de0060a7bb8c97787d99114a828cb8b98d734463bc0ceb365b1677f3e1a3936c24439e5436451c11335f3f3f3d5f1138e4da28f6aed557
-
SSDEEP
98304:vjmtk2aw3jmtk2aH3jmtk2az3KK3dyaXXNJDWjBKUoLIkPeB1LnPnqn9:v+h3++3+y3b3rXXNJDGiLIkGB1zfk9
Malware Config
Extracted
xred
xred.mooo.com
-
payload_url
http://freedns.afraid.org/api/?action=getdyndns&sha=a30fa98efc092684e8d1c5cff797bcc613562978
https://docs.google.com/uc?id=0BxsMXGfPIZfSVlVsOGlEVGxuZVk&export=download
https://www.dropbox.com/s/n1w4p8gc6jzo0sg/SUpdate.ini?dl=1
http://xred.site50.net/syn/SUpdate.ini
https://docs.google.com/uc?id=0BxsMXGfPIZfSVzUyaHFYVkQxeFk&export=download
https://www.dropbox.com/s/zhp1b06imehwylq/Synaptics.rar?dl=1
http://xred.site50.net/syn/Synaptics.rar
https://docs.google.com/uc?id=0BxsMXGfPIZfSTmlVYkxhSDg5TzQ&export=download
https://www.dropbox.com/s/fzj752whr3ontsm/SSLLibrary.dll?dl=1
http://xred.site50.net/syn/SSLLibrary.dll
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000b000000023b80-4.dat family_neshta behavioral2/files/0x000b000000023b81-17.dat family_neshta behavioral2/memory/2076-112-0x0000000000400000-0x00000000007E7000-memory.dmp family_neshta behavioral2/files/0x000a000000023b85-125.dat family_neshta behavioral2/files/0x000b000000023b88-133.dat family_neshta behavioral2/memory/4488-160-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000600000002022f-188.dat family_neshta behavioral2/files/0x00010000000202ad-206.dat family_neshta behavioral2/files/0x0006000000020246-215.dat family_neshta behavioral2/files/0x0004000000020322-214.dat family_neshta behavioral2/files/0x000a000000023b8c-221.dat family_neshta behavioral2/memory/2560-224-0x0000000000400000-0x0000000000720000-memory.dmp family_neshta behavioral2/files/0x00010000000225ed-257.dat family_neshta behavioral2/files/0x0001000000022f7c-282.dat family_neshta behavioral2/files/0x0001000000016853-292.dat family_neshta behavioral2/files/0x0001000000016912-323.dat family_neshta behavioral2/files/0x00030000000215eb-334.dat family_neshta behavioral2/files/0x000a000000023b8e-339.dat family_neshta behavioral2/memory/688-383-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000200000000072b-333.dat family_neshta behavioral2/files/0x0001000000022e7d-330.dat family_neshta behavioral2/files/0x0001000000022e79-329.dat family_neshta behavioral2/files/0x000100000001696e-328.dat family_neshta behavioral2/files/0x0001000000016920-322.dat family_neshta behavioral2/files/0x0001000000016917-321.dat family_neshta behavioral2/files/0x0001000000016911-320.dat family_neshta behavioral2/files/0x0001000000016915-319.dat family_neshta behavioral2/files/0x0001000000016913-318.dat family_neshta behavioral2/memory/4560-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000100000001dbf2-307.dat family_neshta behavioral2/memory/1924-392-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167c1-306.dat family_neshta behavioral2/files/0x00010000000167e7-305.dat family_neshta behavioral2/files/0x00010000000167e8-304.dat family_neshta behavioral2/files/0x00010000000167c3-303.dat family_neshta behavioral2/files/0x00010000000167c7-291.dat family_neshta behavioral2/files/0x00010000000167c9-290.dat family_neshta behavioral2/files/0x00010000000167ae-289.dat family_neshta behavioral2/files/0x0001000000016800-288.dat family_neshta behavioral2/files/0x0001000000022f7e-281.dat family_neshta behavioral2/files/0x0001000000022f3d-280.dat family_neshta behavioral2/files/0x0001000000022f40-279.dat family_neshta behavioral2/files/0x0001000000022f7d-278.dat family_neshta behavioral2/files/0x00010000000214eb-265.dat family_neshta behavioral2/files/0x00010000000214ed-264.dat family_neshta behavioral2/memory/5064-252-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0002000000020326-251.dat family_neshta behavioral2/files/0x0008000000020250-250.dat family_neshta behavioral2/files/0x00010000000202a8-213.dat family_neshta behavioral2/files/0x00010000000202c0-208.dat family_neshta behavioral2/files/0x000400000002034f-207.dat family_neshta behavioral2/files/0x000100000002023e-205.dat family_neshta behavioral2/files/0x000400000002034e-204.dat family_neshta behavioral2/memory/4472-422-0x0000000000400000-0x00000000007E7000-memory.dmp family_neshta behavioral2/memory/4920-489-0x0000000000400000-0x0000000000720000-memory.dmp family_neshta behavioral2/memory/3672-513-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1484-514-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1276-528-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1364-529-0x0000000000400000-0x000000000065A000-memory.dmp family_neshta behavioral2/memory/4596-554-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1128-558-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3224-562-0x0000000000400000-0x0000000000720000-memory.dmp family_neshta behavioral2/memory/1320-561-0x0000000000400000-0x0000000000720000-memory.dmp family_neshta behavioral2/memory/4616-559-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Xred family
-
Checks computer location settings 2 TTPs 47 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation _CACHE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation _CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation _CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation _CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache__CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache__CACHE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache__CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache__CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation _CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation _CACHE~2.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation _CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache__CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation _CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation _CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache__CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache__CACHE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache__CACHE~2.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache__CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation _CACHE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation _CACHE~4.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache__CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation _CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation _CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache__CACHE~3.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache__CACHE~4.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation ._cache_Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation Synaptics.exe -
Executes dropped EXE 64 IoCs
pid Process 2076 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe 1908 ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe 4472 Synaptics.exe 4488 svchost.com 2560 _CACHE~1.EXE 5064 ._cache_Synaptics.exe 688 ._cache__CACHE~1.EXE 4560 svchost.com 4920 _CACHE~2.EXE 1924 svchost.com 1364 _CACHE~3.EXE 3672 ._cache__CACHE~2.EXE 1320 Synaptics.exe 1484 svchost.com 1276 ._cache__CACHE~3.EXE 3744 _CACHE~1.EXE 4616 svchost.com 3884 _CACHE~2.EXE 3224 Synaptics.exe 4596 ._cache_Synaptics.exe 1128 svchost.com 3900 _CACHE~3.EXE 3828 ._cache__CACHE~1.EXE 4804 svchost.com 888 _CACHE~4.EXE 4744 Synaptics.exe 4376 ._cache__CACHE~3.EXE 872 svchost.com 4788 _CACHE~2.EXE 4320 ._cache__CACHE~4.EXE 3368 Synaptics.exe 2336 svchost.com 2016 _C578E~1.EXE 1300 Synaptics.exe 4208 ._cache_Synaptics.exe 996 svchost.com 1808 _CACHE~3.EXE 1048 ._cache__CACHE~3.EXE 2880 svchost.com 1364 _CACHE~2.EXE 4800 Synaptics.exe 948 ._cache_Synaptics.exe 1972 svchost.com 4072 _CACHE~3.EXE 3140 ._cache__CACHE~3.EXE 2432 svchost.com 4760 _CACHE~2.EXE 1128 Synaptics.exe 3596 ._cache_Synaptics.exe 3224 svchost.com 4948 _CACHE~3.EXE 4276 ._cache__CACHE~3.EXE 3904 svchost.com 3008 _CACHE~2.EXE 3472 Synaptics.exe 4616 ._cache_Synaptics.exe 3900 svchost.com 1792 _CACHE~3.EXE 928 ._cache__CACHE~3.EXE 2096 svchost.com 3208 _CACHE~2.EXE 716 Synaptics.exe 1612 ._cache_Synaptics.exe 1696 svchost.com -
Loads dropped DLL 36 IoCs
pid Process 1320 Synaptics.exe 1320 Synaptics.exe 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3224 Synaptics.exe 3224 Synaptics.exe 3900 _CACHE~3.EXE 3900 _CACHE~3.EXE 1300 Synaptics.exe 1300 Synaptics.exe 1808 _CACHE~3.EXE 1808 _CACHE~3.EXE 4800 Synaptics.exe 4800 Synaptics.exe 4072 _CACHE~3.EXE 4072 _CACHE~3.EXE 1128 Synaptics.exe 1128 Synaptics.exe 4948 _CACHE~3.EXE 4948 _CACHE~3.EXE 3472 Synaptics.exe 3472 Synaptics.exe 1792 _CACHE~3.EXE 1792 _CACHE~3.EXE 716 Synaptics.exe 716 Synaptics.exe 2680 _CACHE~3.EXE 2680 _CACHE~3.EXE 4320 Synaptics.exe 4320 Synaptics.exe 2880 _CACHE~3.EXE 2880 _CACHE~3.EXE 5176 Synaptics.exe 5176 Synaptics.exe 5412 _CACHE~3.EXE 5412 _CACHE~3.EXE -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ._cache__CACHE~3.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 12 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" _CACHE~3.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" _CACHE~3.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" _CACHE~3.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" _CACHE~2.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" _CACHE~3.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" _CACHE~3.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" _CACHE~4.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" _CACHE~3.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" _CACHE~3.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" _CACHE~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" _CACHE~3.EXE -
Process spawned suspicious child process 1 IoCs
This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.
description pid pid_target Process procid_target Parent C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE is not expected to spawn this process 8792 60 DW20.EXE 408 -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~3\SYNAPT~1\SYNAPT~1.EXE 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe ._cache__CACHE~3.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe ._cache__CACHE~3.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe ._cache__CACHE~3.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe ._cache__CACHE~3.EXE File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe ._cache__CACHE~3.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe ._cache__CACHE~3.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~3\SYNAPT~1\SYNAPT~1.EXE ._cache__CACHE~3.EXE File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com ._cache__CACHE~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com ._cache_Synaptics.exe File opened for modification C:\Windows\svchost.com ._cache__CACHE~3.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\Windows\svchost.com ._cache__CACHE~3.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys ._cache__CACHE~4.EXE File opened for modification C:\Windows\svchost.com ._cache__CACHE~3.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys ._cache_Synaptics.exe File opened for modification C:\Windows\directx.sys ._cache__CACHE~3.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE File opened for modification C:\Windows\directx.sys ._cache__CACHE~3.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys ._cache_Synaptics.exe File opened for modification C:\Windows\svchost.com ._cache__CACHE~2.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys ._cache__CACHE~3.EXE File opened for modification C:\Windows\directx.sys ._cache__CACHE~3.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys ._cache__CACHE~1.EXE File opened for modification C:\Windows\directx.sys ._cache_Synaptics.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys ._cache_Synaptics.exe File opened for modification C:\Windows\svchost.com ._cache__CACHE~3.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys ._cache_Synaptics.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com ._cache__CACHE~4.EXE File opened for modification C:\Windows\svchost.com ._cache__CACHE~3.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys ._cache__CACHE~3.EXE File opened for modification C:\Windows\svchost.com ._cache_Synaptics.exe File opened for modification C:\Windows\directx.sys ._cache_Synaptics.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys ._cache__CACHE~3.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys ._cache_Synaptics.exe File opened for modification C:\Windows\directx.sys ._cache_Synaptics.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com ._cache_Synaptics.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 8268 8216 WerFault.exe 423 8212 1484 WerFault.exe 433 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache__CACHE~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache__CACHE~4.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache__CACHE~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~4.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache__CACHE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache__CACHE~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _C578E~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache__CACHE~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache__CACHE~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache__CACHE~2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache_Synaptics.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache__CACHE~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language _CACHE~2.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache__CACHE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ._cache__CACHE~3.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Checks processor information in registry 2 TTPs 24 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz EXCEL.EXE -
Enumerates system info in registry 2 TTPs 24 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily EXCEL.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU EXCEL.EXE -
Modifies registry class 48 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ _CACHE~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ _CACHE~3.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache__CACHE~3.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache__CACHE~3.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache__CACHE~3.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ _CACHE~3.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache__CACHE~3.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ _CACHE~2.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ _CACHE~3.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ._cache__CACHE~3.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ _CACHE~3.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ _CACHE~3.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache_Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache__CACHE~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache__CACHE~4.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache__CACHE~3.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ _CACHE~3.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache__CACHE~3.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ _CACHE~3.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache__CACHE~2.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache__CACHE~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ _CACHE~4.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ _CACHE~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache_Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache__CACHE~3.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache__CACHE~3.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache_Synaptics.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ _CACHE~3.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings ._cache_Synaptics.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ _CACHE~3.EXE -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 1080 EXCEL.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 4920 _CACHE~2.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE 3744 _CACHE~1.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 4920 _CACHE~2.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3744 _CACHE~1.EXE Token: SeSystemProfilePrivilege 3900 _CACHE~3.EXE Token: SeSystemProfilePrivilege 3900 _CACHE~3.EXE Token: SeSystemProfilePrivilege 3900 _CACHE~3.EXE Token: SeSystemProfilePrivilege 3900 _CACHE~3.EXE Token: SeSystemProfilePrivilege 3900 _CACHE~3.EXE Token: SeSystemProfilePrivilege 3900 _CACHE~3.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE Token: SeSystemProfilePrivilege 888 _CACHE~4.EXE -
Suspicious use of SetWindowsHookEx 27 IoCs
pid Process 1080 EXCEL.EXE 1080 EXCEL.EXE 1080 EXCEL.EXE 1080 EXCEL.EXE 3600 EXCEL.EXE 3600 EXCEL.EXE 4660 EXCEL.EXE 4660 EXCEL.EXE 3104 EXCEL.EXE 3104 EXCEL.EXE 3104 EXCEL.EXE 3104 EXCEL.EXE 4920 EXCEL.EXE 4920 EXCEL.EXE 4920 EXCEL.EXE 4920 EXCEL.EXE 4748 EXCEL.EXE 4748 EXCEL.EXE 4748 EXCEL.EXE 4748 EXCEL.EXE 1432 EXCEL.EXE 1432 EXCEL.EXE 2080 EXCEL.EXE 2080 EXCEL.EXE 2080 EXCEL.EXE 2080 EXCEL.EXE 5256 EXCEL.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4844 wrote to memory of 2076 4844 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe 83 PID 4844 wrote to memory of 2076 4844 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe 83 PID 4844 wrote to memory of 2076 4844 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe 83 PID 2076 wrote to memory of 1908 2076 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe 84 PID 2076 wrote to memory of 1908 2076 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe 84 PID 2076 wrote to memory of 1908 2076 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe 84 PID 2076 wrote to memory of 4472 2076 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe 85 PID 2076 wrote to memory of 4472 2076 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe 85 PID 2076 wrote to memory of 4472 2076 70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe 85 PID 1908 wrote to memory of 4488 1908 ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe 86 PID 1908 wrote to memory of 4488 1908 ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe 86 PID 1908 wrote to memory of 4488 1908 ._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe 86 PID 4488 wrote to memory of 2560 4488 svchost.com 87 PID 4488 wrote to memory of 2560 4488 svchost.com 87 PID 4488 wrote to memory of 2560 4488 svchost.com 87 PID 4472 wrote to memory of 5064 4472 Synaptics.exe 88 PID 4472 wrote to memory of 5064 4472 Synaptics.exe 88 PID 4472 wrote to memory of 5064 4472 Synaptics.exe 88 PID 2560 wrote to memory of 688 2560 _CACHE~1.EXE 90 PID 2560 wrote to memory of 688 2560 _CACHE~1.EXE 90 PID 2560 wrote to memory of 688 2560 _CACHE~1.EXE 90 PID 5064 wrote to memory of 4560 5064 ._cache_Synaptics.exe 91 PID 5064 wrote to memory of 4560 5064 ._cache_Synaptics.exe 91 PID 5064 wrote to memory of 4560 5064 ._cache_Synaptics.exe 91 PID 4560 wrote to memory of 4920 4560 svchost.com 141 PID 4560 wrote to memory of 4920 4560 svchost.com 141 PID 4560 wrote to memory of 4920 4560 svchost.com 141 PID 688 wrote to memory of 1924 688 ._cache__CACHE~1.EXE 93 PID 688 wrote to memory of 1924 688 ._cache__CACHE~1.EXE 93 PID 688 wrote to memory of 1924 688 ._cache__CACHE~1.EXE 93 PID 1924 wrote to memory of 1364 1924 svchost.com 130 PID 1924 wrote to memory of 1364 1924 svchost.com 130 PID 1924 wrote to memory of 1364 1924 svchost.com 130 PID 4920 wrote to memory of 3672 4920 _CACHE~2.EXE 96 PID 4920 wrote to memory of 3672 4920 _CACHE~2.EXE 96 PID 4920 wrote to memory of 3672 4920 _CACHE~2.EXE 96 PID 4920 wrote to memory of 1320 4920 _CACHE~2.EXE 97 PID 4920 wrote to memory of 1320 4920 _CACHE~2.EXE 97 PID 4920 wrote to memory of 1320 4920 _CACHE~2.EXE 97 PID 3672 wrote to memory of 1484 3672 ._cache__CACHE~2.EXE 98 PID 3672 wrote to memory of 1484 3672 ._cache__CACHE~2.EXE 98 PID 3672 wrote to memory of 1484 3672 ._cache__CACHE~2.EXE 98 PID 1364 wrote to memory of 1276 1364 _CACHE~3.EXE 99 PID 1364 wrote to memory of 1276 1364 _CACHE~3.EXE 99 PID 1364 wrote to memory of 1276 1364 _CACHE~3.EXE 99 PID 1484 wrote to memory of 3744 1484 svchost.com 100 PID 1484 wrote to memory of 3744 1484 svchost.com 100 PID 1484 wrote to memory of 3744 1484 svchost.com 100 PID 1276 wrote to memory of 4616 1276 ._cache__CACHE~3.EXE 205 PID 1276 wrote to memory of 4616 1276 ._cache__CACHE~3.EXE 205 PID 1276 wrote to memory of 4616 1276 ._cache__CACHE~3.EXE 205 PID 4616 wrote to memory of 3884 4616 svchost.com 102 PID 4616 wrote to memory of 3884 4616 svchost.com 102 PID 4616 wrote to memory of 3884 4616 svchost.com 102 PID 1364 wrote to memory of 3224 1364 _CACHE~3.EXE 142 PID 1364 wrote to memory of 3224 1364 _CACHE~3.EXE 142 PID 1364 wrote to memory of 3224 1364 _CACHE~3.EXE 142 PID 1320 wrote to memory of 4596 1320 Synaptics.exe 104 PID 1320 wrote to memory of 4596 1320 Synaptics.exe 104 PID 1320 wrote to memory of 4596 1320 Synaptics.exe 104 PID 4596 wrote to memory of 1128 4596 ._cache_Synaptics.exe 139 PID 4596 wrote to memory of 1128 4596 ._cache_Synaptics.exe 139 PID 4596 wrote to memory of 1128 4596 ._cache_Synaptics.exe 139 PID 1128 wrote to memory of 3900 1128 svchost.com 150
Processes
-
C:\Users\Admin\AppData\Local\Temp\70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe"C:\Users\Admin\AppData\Local\Temp\70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Users\Admin\AppData\Local\Temp\3582-490\70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe"C:\Users\Admin\AppData\Local\Temp\._cache_70636c3fd3bdab42234e249084ebada003015df3d943b9d9e3c3cf61dd057e1e.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE5⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE"10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3884
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate9⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3224
-
-
-
-
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate6⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~2.EXE" InjUpdate7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE" InjUpdate8⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~1.EXE InjUpdate9⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~1.EXE" InjUpdate10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~4.EXE" InjUpdate11⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~4.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~4.EXE InjUpdate12⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:888 -
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~4.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~4.EXE" InjUpdate13⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_C578E~1.EXE" InjUpdate14⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_C578E~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_C578E~1.EXE InjUpdate15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2016
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate14⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate15⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate16⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate18⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1364
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate17⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate19⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate20⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate22⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4760
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate21⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1128 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate23⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate24⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4948 -
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate25⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate26⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3008
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate25⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate28⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate29⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate30⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3208
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate29⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:716 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate32⤵
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate33⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:3560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate34⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate35⤵
- System Location Discovery: System Language Discovery
PID:2928
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate33⤵
- Checks computer location settings
- Loads dropped DLL
- Modifies registry class
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate34⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1420 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate35⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate36⤵
- Checks computer location settings
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate37⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate38⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate39⤵
- System Location Discovery: System Language Discovery
PID:964
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate37⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5176 -
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate38⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:5244 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate39⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5360 -
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate40⤵
- Checks computer location settings
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5412 -
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate41⤵PID:5572
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate42⤵PID:5860
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate43⤵PID:5900
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate41⤵PID:5976
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate42⤵PID:6064
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate43⤵PID:3204
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate44⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate45⤵PID:5340
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate46⤵PID:5708
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate47⤵PID:468
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate45⤵PID:5668
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate46⤵PID:5748
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate47⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate48⤵PID:5584
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate49⤵PID:6100
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate50⤵PID:5380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate51⤵PID:3356
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate49⤵PID:5976
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate50⤵PID:5212
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate51⤵PID:3904
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate52⤵PID:5352
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate53⤵PID:1856
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate54⤵PID:4324
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate55⤵PID:4208
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate53⤵PID:4616
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate54⤵PID:1168
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate55⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate56⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate57⤵PID:5628
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate58⤵PID:5124
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate59⤵PID:5084
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate57⤵PID:5164
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate58⤵PID:5644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate59⤵PID:5840
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate60⤵PID:5772
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate61⤵PID:2104
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate62⤵PID:1168
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate63⤵PID:1692
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate61⤵PID:5432
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate62⤵PID:5768
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate63⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate64⤵PID:5396
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate65⤵PID:1300
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate66⤵PID:5388
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate67⤵PID:5580
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate65⤵PID:5636
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate66⤵PID:1616
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate67⤵PID:5768
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate68⤵PID:5624
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate69⤵PID:4284
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate70⤵PID:6232
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate71⤵PID:6304
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate69⤵PID:6276
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate70⤵PID:6392
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate71⤵PID:6536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate72⤵PID:6580
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate73⤵PID:6692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate74⤵PID:6776
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate75⤵PID:6924
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate73⤵PID:7064
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate74⤵PID:1492
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate75⤵PID:6216
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate76⤵PID:5844
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate77⤵PID:6472
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate78⤵PID:6564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate79⤵PID:6448
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate77⤵PID:6932
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate78⤵PID:6660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate79⤵PID:6196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate80⤵PID:4776
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate81⤵PID:6432
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate82⤵PID:6876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate83⤵PID:6948
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate81⤵PID:5212
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate82⤵PID:1948
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate83⤵PID:6208
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate84⤵PID:6656
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate85⤵PID:7004
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate86⤵PID:6256
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate87⤵PID:6620
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate85⤵PID:7040
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate86⤵PID:5224
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate87⤵PID:6848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate88⤵PID:6872
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate89⤵PID:7044
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate90⤵PID:7068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate91⤵PID:6968
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate89⤵PID:7056
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate90⤵PID:7124
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate91⤵PID:6824
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate92⤵PID:6836
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate93⤵PID:6500
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate94⤵PID:5728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate95⤵PID:7196
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate93⤵PID:6392
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate94⤵PID:7296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate95⤵PID:7412
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate96⤵PID:7448
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate97⤵PID:7608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate98⤵PID:7676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate99⤵PID:7724
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate97⤵PID:7668
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate98⤵PID:7828
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate99⤵PID:7940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate100⤵PID:7984
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate101⤵PID:8144
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate102⤵PID:6356
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate103⤵PID:7240
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate101⤵PID:6896
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate102⤵PID:7396
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate103⤵PID:6936
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate104⤵PID:7424
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate105⤵PID:7448
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate106⤵PID:6728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate107⤵PID:4800
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate105⤵PID:6908
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate106⤵PID:6276
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate107⤵PID:6348
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate108⤵PID:6432
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate109⤵PID:7260
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate110⤵PID:8044
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate111⤵PID:7672
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate109⤵PID:7772
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate110⤵PID:2268
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate111⤵PID:7424
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate112⤵PID:7988
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate113⤵PID:7124
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate114⤵PID:7552
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate115⤵PID:8164
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate113⤵PID:7956
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate114⤵PID:7780
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate115⤵PID:6848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate116⤵PID:6500
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate117⤵PID:7800
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate118⤵PID:7832
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE InjUpdate119⤵PID:7976
-
-
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate117⤵PID:6368
-
C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe"C:\Users\Admin\AppData\Local\Temp\._cache_Synaptics.exe" InjUpdate118⤵PID:6728
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE" InjUpdate119⤵PID:7948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~3.EXE InjUpdate120⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE"C:\Users\Admin\AppData\Local\Temp\._cache__CACHE~3.EXE" InjUpdate121⤵PID:6208
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\_CACHE~2.EXE" InjUpdate122⤵PID:5548
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-