Analysis
-
max time kernel
91s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2024 20:49
Behavioral task
behavioral1
Sample
2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe
Resource
win10v2004-20241007-en
General
-
Target
2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe
-
Size
1.6MB
-
MD5
e7e5ab552852f2027064ae3e67efe3bc
-
SHA1
c3f2d53a6e22e9420dd13683c34d5501445f4759
-
SHA256
2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae
-
SHA512
369948178e73ab775de6c239aa9e1e0b30789db6bed443047d3a5ac0a06c4a35f762b6de22b0997250332c954ee29b06cb3d9b99aaddd8747fa490e9847bf104
-
SSDEEP
49152:GRJmTQooBKegkLELQq7JJn6FkJfEXwdwAjTqWTy:GRJmTrBecFwll
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0007000000023ce1-4.dat family_neshta behavioral2/files/0x0007000000023ce2-10.dat family_neshta behavioral2/memory/1824-18-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/880-29-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/944-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1216-34-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1356-42-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5112-53-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2452-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1496-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1448-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1428-70-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2908-78-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4896-82-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002035f-94.dat family_neshta behavioral2/files/0x000700000002029a-97.dat family_neshta behavioral2/files/0x000600000002022e-100.dat family_neshta behavioral2/files/0x000600000002023a-99.dat family_neshta behavioral2/memory/4336-107-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020249-116.dat family_neshta behavioral2/files/0x0004000000020325-115.dat family_neshta behavioral2/files/0x00010000000202ab-114.dat family_neshta behavioral2/files/0x0004000000020352-106.dat family_neshta behavioral2/files/0x0006000000020232-98.dat family_neshta behavioral2/memory/2524-127-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/828-128-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/512-144-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0008000000020253-142.dat family_neshta behavioral2/memory/1920-148-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214f4-151.dat family_neshta behavioral2/memory/876-167-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214f5-158.dat family_neshta behavioral2/files/0x0001000000022f47-171.dat family_neshta behavioral2/files/0x0001000000022f84-181.dat family_neshta behavioral2/files/0x0001000000022f86-180.dat family_neshta behavioral2/files/0x00010000000167c6-188.dat family_neshta behavioral2/files/0x0001000000016852-189.dat family_neshta behavioral2/files/0x0001000000016802-192.dat family_neshta behavioral2/files/0x00010000000167e6-196.dat family_neshta behavioral2/files/0x000100000001dbb6-199.dat family_neshta behavioral2/files/0x000100000001dbc9-201.dat family_neshta behavioral2/files/0x0001000000016916-210.dat family_neshta behavioral2/memory/2160-215-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3044-217-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2868-226-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2488-241-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3076-245-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4432-250-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4512-258-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1144-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1384-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4152-274-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1376-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1596-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2020-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1264-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4092-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3064-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4132-304-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1272-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1428-312-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4344-319-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3012-320-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2936-322-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 2C89EC~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 1080 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe 1824 svchost.com 880 2C89EC~1.EXE 944 svchost.com 1216 2C89EC~1.EXE 1356 svchost.com 5112 2C89EC~1.EXE 2452 svchost.com 1496 2C89EC~1.EXE 1448 svchost.com 1428 2C89EC~1.EXE 2908 svchost.com 4896 2C89EC~1.EXE 4336 svchost.com 2524 2C89EC~1.EXE 828 svchost.com 512 2C89EC~1.EXE 1920 svchost.com 876 2C89EC~1.EXE 2160 svchost.com 3044 2C89EC~1.EXE 2868 svchost.com 2488 2C89EC~1.EXE 3076 svchost.com 4432 2C89EC~1.EXE 4512 svchost.com 1144 2C89EC~1.EXE 1384 svchost.com 4152 2C89EC~1.EXE 1376 svchost.com 1596 2C89EC~1.EXE 2020 svchost.com 1264 2C89EC~1.EXE 4092 svchost.com 3064 2C89EC~1.EXE 4132 svchost.com 1272 2C89EC~1.EXE 1428 svchost.com 4344 2C89EC~1.EXE 3012 svchost.com 2936 2C89EC~1.EXE 4544 svchost.com 2616 2C89EC~1.EXE 2692 svchost.com 2552 2C89EC~1.EXE 4612 svchost.com 3516 2C89EC~1.EXE 3332 svchost.com 3512 2C89EC~1.EXE 1768 svchost.com 1280 2C89EC~1.EXE 2420 svchost.com 1712 2C89EC~1.EXE 1492 svchost.com 1480 2C89EC~1.EXE 1740 svchost.com 3624 2C89EC~1.EXE 1516 svchost.com 392 2C89EC~1.EXE 1504 svchost.com 4440 2C89EC~1.EXE 3076 svchost.com 1420 2C89EC~1.EXE 4616 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaws.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2C89EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\svchost.com 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\svchost.com 2C89EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\svchost.com 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 2C89EC~1.EXE File opened for modification C:\Windows\svchost.com 2C89EC~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2C89EC~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 2C89EC~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5072 wrote to memory of 1080 5072 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe 84 PID 5072 wrote to memory of 1080 5072 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe 84 PID 5072 wrote to memory of 1080 5072 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe 84 PID 1080 wrote to memory of 1824 1080 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe 85 PID 1080 wrote to memory of 1824 1080 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe 85 PID 1080 wrote to memory of 1824 1080 2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe 85 PID 1824 wrote to memory of 880 1824 svchost.com 86 PID 1824 wrote to memory of 880 1824 svchost.com 86 PID 1824 wrote to memory of 880 1824 svchost.com 86 PID 880 wrote to memory of 944 880 2C89EC~1.EXE 87 PID 880 wrote to memory of 944 880 2C89EC~1.EXE 87 PID 880 wrote to memory of 944 880 2C89EC~1.EXE 87 PID 944 wrote to memory of 1216 944 svchost.com 88 PID 944 wrote to memory of 1216 944 svchost.com 88 PID 944 wrote to memory of 1216 944 svchost.com 88 PID 1216 wrote to memory of 1356 1216 2C89EC~1.EXE 89 PID 1216 wrote to memory of 1356 1216 2C89EC~1.EXE 89 PID 1216 wrote to memory of 1356 1216 2C89EC~1.EXE 89 PID 1356 wrote to memory of 5112 1356 svchost.com 90 PID 1356 wrote to memory of 5112 1356 svchost.com 90 PID 1356 wrote to memory of 5112 1356 svchost.com 90 PID 5112 wrote to memory of 2452 5112 2C89EC~1.EXE 91 PID 5112 wrote to memory of 2452 5112 2C89EC~1.EXE 91 PID 5112 wrote to memory of 2452 5112 2C89EC~1.EXE 91 PID 2452 wrote to memory of 1496 2452 svchost.com 92 PID 2452 wrote to memory of 1496 2452 svchost.com 92 PID 2452 wrote to memory of 1496 2452 svchost.com 92 PID 1496 wrote to memory of 1448 1496 2C89EC~1.EXE 93 PID 1496 wrote to memory of 1448 1496 2C89EC~1.EXE 93 PID 1496 wrote to memory of 1448 1496 2C89EC~1.EXE 93 PID 1448 wrote to memory of 1428 1448 svchost.com 121 PID 1448 wrote to memory of 1428 1448 svchost.com 121 PID 1448 wrote to memory of 1428 1448 svchost.com 121 PID 1428 wrote to memory of 2908 1428 2C89EC~1.EXE 95 PID 1428 wrote to memory of 2908 1428 2C89EC~1.EXE 95 PID 1428 wrote to memory of 2908 1428 2C89EC~1.EXE 95 PID 2908 wrote to memory of 4896 2908 svchost.com 96 PID 2908 wrote to memory of 4896 2908 svchost.com 96 PID 2908 wrote to memory of 4896 2908 svchost.com 96 PID 4896 wrote to memory of 4336 4896 2C89EC~1.EXE 97 PID 4896 wrote to memory of 4336 4896 2C89EC~1.EXE 97 PID 4896 wrote to memory of 4336 4896 2C89EC~1.EXE 97 PID 4336 wrote to memory of 2524 4336 svchost.com 98 PID 4336 wrote to memory of 2524 4336 svchost.com 98 PID 4336 wrote to memory of 2524 4336 svchost.com 98 PID 2524 wrote to memory of 828 2524 2C89EC~1.EXE 99 PID 2524 wrote to memory of 828 2524 2C89EC~1.EXE 99 PID 2524 wrote to memory of 828 2524 2C89EC~1.EXE 99 PID 828 wrote to memory of 512 828 svchost.com 100 PID 828 wrote to memory of 512 828 svchost.com 100 PID 828 wrote to memory of 512 828 svchost.com 100 PID 512 wrote to memory of 1920 512 2C89EC~1.EXE 101 PID 512 wrote to memory of 1920 512 2C89EC~1.EXE 101 PID 512 wrote to memory of 1920 512 2C89EC~1.EXE 101 PID 1920 wrote to memory of 876 1920 svchost.com 102 PID 1920 wrote to memory of 876 1920 svchost.com 102 PID 1920 wrote to memory of 876 1920 svchost.com 102 PID 876 wrote to memory of 2160 876 2C89EC~1.EXE 177 PID 876 wrote to memory of 2160 876 2C89EC~1.EXE 177 PID 876 wrote to memory of 2160 876 2C89EC~1.EXE 177 PID 2160 wrote to memory of 3044 2160 svchost.com 104 PID 2160 wrote to memory of 3044 2160 svchost.com 104 PID 2160 wrote to memory of 3044 2160 svchost.com 104 PID 3044 wrote to memory of 2868 3044 2C89EC~1.EXE 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe"C:\Users\Admin\AppData\Local\Temp\2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\2c89ecb78073b823c7d466390f5bdb371d2fc77ff3ff2a8c66ee5c9eedd09aae.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"17⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"19⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"23⤵
- Executes dropped EXE
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"25⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE28⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1144 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"29⤵
- Executes dropped EXE
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
PID:4152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"31⤵
- Executes dropped EXE
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"33⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"35⤵
- Executes dropped EXE
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE40⤵
- Executes dropped EXE
- Modifies registry class
PID:4344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE42⤵
- Executes dropped EXE
- Modifies registry class
PID:2936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"43⤵
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"45⤵
- Executes dropped EXE
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE46⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE48⤵
- Executes dropped EXE
- Modifies registry class
PID:3516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"49⤵
- Executes dropped EXE
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE52⤵
- Executes dropped EXE
PID:1280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE54⤵
- Executes dropped EXE
- Modifies registry class
PID:1712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"55⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE56⤵
- Executes dropped EXE
PID:1480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"57⤵
- Executes dropped EXE
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE58⤵
- Executes dropped EXE
- Modifies registry class
PID:3624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"59⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE60⤵
- Executes dropped EXE
PID:392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"61⤵
- Executes dropped EXE
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE62⤵
- Executes dropped EXE
PID:4440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1420 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"65⤵
- Executes dropped EXE
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE66⤵PID:3272
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"67⤵PID:3228
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE68⤵PID:1384
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"69⤵PID:4780
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE70⤵
- Checks computer location settings
- Modifies registry class
PID:2016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"71⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE72⤵
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:328 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE74⤵
- Checks computer location settings
- Modifies registry class
PID:116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"75⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE76⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"77⤵PID:3912
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE78⤵
- Checks computer location settings
PID:1828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"79⤵
- System Location Discovery: System Language Discovery
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE80⤵
- Drops file in Windows directory
- Modifies registry class
PID:1640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"81⤵
- System Location Discovery: System Language Discovery
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE82⤵
- Checks computer location settings
PID:3008 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"83⤵PID:3156
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE84⤵
- Modifies registry class
PID:4076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"85⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE86⤵PID:3704
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"87⤵PID:3708
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE88⤵
- Modifies registry class
PID:3168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"89⤵
- System Location Discovery: System Language Discovery
PID:968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE90⤵
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"91⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE92⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"93⤵
- Drops file in Windows directory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE94⤵PID:3756
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"95⤵PID:2160
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE96⤵PID:4012
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"97⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE98⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"99⤵PID:5024
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE100⤵
- Checks computer location settings
PID:3132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"101⤵PID:4428
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE102⤵
- Checks computer location settings
- Modifies registry class
PID:3532 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"103⤵PID:4432
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE104⤵PID:5020
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"105⤵PID:4848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE106⤵
- Drops file in Windows directory
- Modifies registry class
PID:3896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"107⤵
- Drops file in Windows directory
PID:3272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE108⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"109⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE110⤵
- Checks computer location settings
PID:1328 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"111⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE112⤵
- Checks computer location settings
PID:2852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"113⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE114⤵PID:3656
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"115⤵
- Drops file in Windows directory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE116⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"117⤵
- Drops file in Windows directory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE118⤵
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"119⤵
- Drops file in Windows directory
PID:832 -
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE120⤵
- Modifies registry class
PID:1428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE"121⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\2C89EC~1.EXE122⤵PID:4836
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-