Analysis
-
max time kernel
150s -
max time network
276s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-12-2024 23:09
Behavioral task
behavioral1
Sample
028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe
Resource
win10v2004-20241007-en
General
-
Target
028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe
-
Size
391KB
-
MD5
bc1235b936dea3cf19830d6d6fb39594
-
SHA1
d51a0c9489c5a7117decd98f06c03d99d9f2e009
-
SHA256
028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8
-
SHA512
4b02aec7f2b2a0752335c647a31fa44d2e6e5557bffc6894520ed37247f47ee80aa5a6da070d2cea8c7cf0e980abaf7a81c6cb2d78e5ddd92f1176118362a59b
-
SSDEEP
6144:k9t/B5fpRr3TmiTVVmVVV8VVNVVVcVVVxVVVPVVlVVVRVVVtVVWV60jVLVVOVVUt:c/B5fn5cqj4D
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0008000000023cb2-4.dat family_neshta behavioral2/files/0x0007000000023cb7-11.dat family_neshta behavioral2/memory/4624-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4644-20-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1580-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4864-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2864-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1156-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4576-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1832-62-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4668-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4104-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3724-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4996-87-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1372-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2888-92-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4080-100-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020358-102.dat family_neshta behavioral2/files/0x0007000000020293-112.dat family_neshta behavioral2/memory/4384-118-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4672-131-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1852-142-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3048-143-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3004-153-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2936-155-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3088-166-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000800000002024a-170.dat family_neshta behavioral2/memory/4528-182-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3596-167-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214f0-194.dat family_neshta behavioral2/files/0x00010000000214ef-193.dat family_neshta behavioral2/files/0x0001000000022f6f-201.dat family_neshta behavioral2/files/0x0001000000022f2d-199.dat family_neshta behavioral2/files/0x0001000000016804-210.dat family_neshta behavioral2/files/0x00010000000214ee-192.dat family_neshta behavioral2/files/0x00010000000225ec-191.dat family_neshta behavioral2/memory/4060-240-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/624-248-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1560-267-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1360-276-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3344-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4336-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3064-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4748-291-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1908-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4288-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4592-305-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4576-307-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3032-313-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4504-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4676-321-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4088-323-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2532-329-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1412-336-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4488-337-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2428-344-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/912-345-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4800-347-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2876-353-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1856-360-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3680-361-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2708-368-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4112-369-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/824-371-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 028343~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 3948 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe 4624 svchost.com 4644 028343~1.EXE 1580 svchost.com 4864 028343~1.EXE 2864 svchost.com 1156 028343~1.EXE 4576 svchost.com 1832 028343~1.EXE 4668 svchost.com 4104 028343~1.EXE 3724 svchost.com 4996 028343~1.EXE 1372 svchost.com 2888 028343~1.EXE 4080 svchost.com 4384 028343~1.EXE 4672 svchost.com 1852 028343~1.EXE 3048 svchost.com 3004 028343~1.EXE 2936 svchost.com 3088 028343~1.EXE 3596 svchost.com 4528 028343~1.EXE 4060 svchost.com 624 028343~1.EXE 1560 svchost.com 1360 028343~1.EXE 3344 svchost.com 4336 028343~1.EXE 3064 svchost.com 4748 028343~1.EXE 1908 svchost.com 4288 028343~1.EXE 4592 svchost.com 4576 028343~1.EXE 3032 svchost.com 4504 028343~1.EXE 4676 svchost.com 4088 028343~1.EXE 2532 svchost.com 1412 028343~1.EXE 4488 svchost.com 2428 028343~1.EXE 912 svchost.com 4800 028343~1.EXE 2876 svchost.com 1856 028343~1.EXE 3680 svchost.com 2708 028343~1.EXE 4112 svchost.com 824 028343~1.EXE 1660 svchost.com 4660 028343~1.EXE 3896 svchost.com 3296 028343~1.EXE 2152 svchost.com 2536 028343~1.EXE 4404 svchost.com 2296 028343~1.EXE 5000 svchost.com 2388 028343~1.EXE 4352 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 028343~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 028343~1.EXE File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 028343~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 028343~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\svchost.com 028343~1.EXE File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 028343~1.EXE File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 028343~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 028343~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 028343~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 028343~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\directx.sys 028343~1.EXE File opened for modification C:\Windows\svchost.com 028343~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 028343~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 028343~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1960 wrote to memory of 3948 1960 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe 83 PID 1960 wrote to memory of 3948 1960 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe 83 PID 1960 wrote to memory of 3948 1960 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe 83 PID 3948 wrote to memory of 4624 3948 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe 84 PID 3948 wrote to memory of 4624 3948 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe 84 PID 3948 wrote to memory of 4624 3948 028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe 84 PID 4624 wrote to memory of 4644 4624 svchost.com 85 PID 4624 wrote to memory of 4644 4624 svchost.com 85 PID 4624 wrote to memory of 4644 4624 svchost.com 85 PID 4644 wrote to memory of 1580 4644 028343~1.EXE 86 PID 4644 wrote to memory of 1580 4644 028343~1.EXE 86 PID 4644 wrote to memory of 1580 4644 028343~1.EXE 86 PID 1580 wrote to memory of 4864 1580 svchost.com 87 PID 1580 wrote to memory of 4864 1580 svchost.com 87 PID 1580 wrote to memory of 4864 1580 svchost.com 87 PID 4864 wrote to memory of 2864 4864 028343~1.EXE 88 PID 4864 wrote to memory of 2864 4864 028343~1.EXE 88 PID 4864 wrote to memory of 2864 4864 028343~1.EXE 88 PID 2864 wrote to memory of 1156 2864 svchost.com 89 PID 2864 wrote to memory of 1156 2864 svchost.com 89 PID 2864 wrote to memory of 1156 2864 svchost.com 89 PID 1156 wrote to memory of 4576 1156 028343~1.EXE 119 PID 1156 wrote to memory of 4576 1156 028343~1.EXE 119 PID 1156 wrote to memory of 4576 1156 028343~1.EXE 119 PID 4576 wrote to memory of 1832 4576 svchost.com 91 PID 4576 wrote to memory of 1832 4576 svchost.com 91 PID 4576 wrote to memory of 1832 4576 svchost.com 91 PID 1832 wrote to memory of 4668 1832 028343~1.EXE 92 PID 1832 wrote to memory of 4668 1832 028343~1.EXE 92 PID 1832 wrote to memory of 4668 1832 028343~1.EXE 92 PID 4668 wrote to memory of 4104 4668 svchost.com 93 PID 4668 wrote to memory of 4104 4668 svchost.com 93 PID 4668 wrote to memory of 4104 4668 svchost.com 93 PID 4104 wrote to memory of 3724 4104 028343~1.EXE 94 PID 4104 wrote to memory of 3724 4104 028343~1.EXE 94 PID 4104 wrote to memory of 3724 4104 028343~1.EXE 94 PID 3724 wrote to memory of 4996 3724 svchost.com 95 PID 3724 wrote to memory of 4996 3724 svchost.com 95 PID 3724 wrote to memory of 4996 3724 svchost.com 95 PID 4996 wrote to memory of 1372 4996 028343~1.EXE 96 PID 4996 wrote to memory of 1372 4996 028343~1.EXE 96 PID 4996 wrote to memory of 1372 4996 028343~1.EXE 96 PID 1372 wrote to memory of 2888 1372 svchost.com 97 PID 1372 wrote to memory of 2888 1372 svchost.com 97 PID 1372 wrote to memory of 2888 1372 svchost.com 97 PID 2888 wrote to memory of 4080 2888 028343~1.EXE 98 PID 2888 wrote to memory of 4080 2888 028343~1.EXE 98 PID 2888 wrote to memory of 4080 2888 028343~1.EXE 98 PID 4080 wrote to memory of 4384 4080 svchost.com 99 PID 4080 wrote to memory of 4384 4080 svchost.com 99 PID 4080 wrote to memory of 4384 4080 svchost.com 99 PID 4384 wrote to memory of 4672 4384 028343~1.EXE 100 PID 4384 wrote to memory of 4672 4384 028343~1.EXE 100 PID 4384 wrote to memory of 4672 4384 028343~1.EXE 100 PID 4672 wrote to memory of 1852 4672 svchost.com 101 PID 4672 wrote to memory of 1852 4672 svchost.com 101 PID 4672 wrote to memory of 1852 4672 svchost.com 101 PID 1852 wrote to memory of 3048 1852 028343~1.EXE 102 PID 1852 wrote to memory of 3048 1852 028343~1.EXE 102 PID 1852 wrote to memory of 3048 1852 028343~1.EXE 102 PID 3048 wrote to memory of 3004 3048 svchost.com 103 PID 3048 wrote to memory of 3004 3048 svchost.com 103 PID 3048 wrote to memory of 3004 3048 svchost.com 103 PID 3004 wrote to memory of 2936 3004 028343~1.EXE 218
Processes
-
C:\Users\Admin\AppData\Local\Temp\028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe"C:\Users\Admin\AppData\Local\Temp\028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\028343f7cf9661471bdf9b9a6923797a963211f91edf4678bf66c52aca7838e8.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"21⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"23⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"25⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE28⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"29⤵
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE30⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1360 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"33⤵
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE34⤵
- Executes dropped EXE
PID:4748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE36⤵
- Executes dropped EXE
PID:4288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"37⤵
- Executes dropped EXE
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE38⤵
- Executes dropped EXE
PID:4576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
PID:4088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE44⤵
- Executes dropped EXE
- Modifies registry class
PID:1412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE46⤵
- Executes dropped EXE
PID:2428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"47⤵
- Executes dropped EXE
PID:912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE48⤵
- Executes dropped EXE
- Modifies registry class
PID:4800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"49⤵
- Executes dropped EXE
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"51⤵
- Executes dropped EXE
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE52⤵
- Executes dropped EXE
- Modifies registry class
PID:2708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"53⤵
- Executes dropped EXE
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
PID:824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"55⤵
- Executes dropped EXE
PID:1660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4660 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3896 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE58⤵
- Executes dropped EXE
PID:3296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"59⤵
- Executes dropped EXE
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"61⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE62⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"63⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE64⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"65⤵
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE66⤵
- Checks computer location settings
PID:2276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"67⤵PID:4200
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE68⤵
- Checks computer location settings
PID:536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"69⤵PID:4744
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE70⤵
- Drops file in Windows directory
- Modifies registry class
PID:2104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"71⤵PID:2768
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE72⤵
- Modifies registry class
PID:3232 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"73⤵PID:4832
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE74⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"75⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE76⤵
- Modifies registry class
PID:416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"77⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE78⤵
- Checks computer location settings
- Modifies registry class
PID:3032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"79⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE80⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"81⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE82⤵PID:4136
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"83⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE84⤵PID:4904
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"85⤵
- Drops file in Windows directory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE86⤵
- Checks computer location settings
PID:3352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"87⤵PID:3448
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE88⤵
- Modifies registry class
PID:3132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"89⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE90⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"91⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE92⤵
- Checks computer location settings
PID:3736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"93⤵PID:100
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE94⤵
- Checks computer location settings
PID:2444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"95⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE96⤵PID:2164
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"97⤵PID:4072
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE98⤵
- Drops file in Windows directory
PID:4068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE100⤵
- Checks computer location settings
PID:920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"101⤵
- Drops file in Windows directory
PID:3772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE102⤵PID:4932
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"103⤵
- Drops file in Windows directory
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE104⤵
- Modifies registry class
PID:4524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"105⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE106⤵
- Checks computer location settings
PID:3236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"107⤵
- Drops file in Windows directory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE108⤵
- Checks computer location settings
- Modifies registry class
PID:4340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"109⤵
- System Location Discovery: System Language Discovery
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE110⤵PID:3516
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:4180 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE112⤵
- Checks computer location settings
PID:2852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"113⤵PID:404
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE114⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"115⤵
- Drops file in Windows directory
PID:524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE116⤵PID:1656
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"117⤵PID:4288
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE118⤵
- Checks computer location settings
- Modifies registry class
PID:3576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"119⤵
- System Location Discovery: System Language Discovery
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE120⤵
- Checks computer location settings
PID:416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE"121⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\028343~1.EXE122⤵PID:3032
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-