Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 13:33
Behavioral task
behavioral1
Sample
5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe
Resource
win10v2004-20241007-en
General
-
Target
5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe
-
Size
1.5MB
-
MD5
18fc193b873fe0b1bec71f9adb81b980
-
SHA1
22e26e736643fde32ce7afa3c60af3c4bec9e9fe
-
SHA256
5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060
-
SHA512
b2ab211ccf0f000e3467aae352a70cb2025226efb091f0f87761857b1e1432026895207d1473d2f6c152fb8364e7d8d775698d20c21917884fde3300478eb7aa
-
SSDEEP
24576:Z7f/qIBpJA8uyQh8ce3N1BaSD7hVDaV+nmMUhlHSIN68sqBzc+Fj:99RTkSrDyImlHSIN68sqlc+Fj
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0007000000023c96-4.dat family_neshta behavioral2/files/0x0007000000023c97-10.dat family_neshta behavioral2/memory/1112-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3312-22-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/380-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3768-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4688-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3652-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2388-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3436-63-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4508-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1156-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020348-77.dat family_neshta behavioral2/files/0x0007000000020283-81.dat family_neshta behavioral2/files/0x0006000000020223-85.dat family_neshta behavioral2/memory/3888-79-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1564-115-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020232-112.dat family_neshta behavioral2/files/0x000400000002030e-111.dat family_neshta behavioral2/files/0x0001000000020294-110.dat family_neshta behavioral2/memory/2712-116-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002034d-109.dat family_neshta behavioral2/files/0x00010000000202ac-108.dat family_neshta behavioral2/files/0x000400000002033b-107.dat family_neshta behavioral2/files/0x0001000000020299-106.dat family_neshta behavioral2/memory/2044-127-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000100000002022a-105.dat family_neshta behavioral2/memory/760-128-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4524-141-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0002000000020312-144.dat family_neshta behavioral2/files/0x000600000002023a-140.dat family_neshta behavioral2/files/0x00010000000214e1-156.dat family_neshta behavioral2/files/0x00010000000214e0-155.dat family_neshta behavioral2/files/0x0001000000022f80-169.dat family_neshta behavioral2/files/0x00010000000167c8-182.dat family_neshta behavioral2/files/0x00010000000167c4-179.dat family_neshta behavioral2/files/0x00010000000167c6-177.dat family_neshta behavioral2/files/0x00010000000167ab-176.dat family_neshta behavioral2/files/0x00010000000167fd-175.dat family_neshta behavioral2/memory/2284-171-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f7f-162.dat family_neshta behavioral2/files/0x0001000000022f3d-161.dat family_neshta behavioral2/files/0x0001000000022f41-160.dat family_neshta behavioral2/files/0x00010000000214df-154.dat family_neshta behavioral2/memory/876-210-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2236-220-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4068-200-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000225de-153.dat family_neshta behavioral2/memory/2556-232-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2696-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3164-245-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3948-247-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4312-256-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4020-258-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1604-264-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4172-266-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4420-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2440-274-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1104-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4060-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3860-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1136-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3228-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3652-298-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 5B2288~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 2568 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe 1112 svchost.com 3312 5B2288~1.EXE 380 svchost.com 3768 5B2288~1.EXE 4688 svchost.com 3652 5B2288~1.EXE 2388 svchost.com 3436 5B2288~1.EXE 4508 svchost.com 1156 5B2288~1.EXE 3888 svchost.com 1564 5B2288~1.EXE 2712 svchost.com 2044 5B2288~1.EXE 760 svchost.com 4524 5B2288~1.EXE 2284 svchost.com 4068 5B2288~1.EXE 876 svchost.com 2236 5B2288~1.EXE 2556 svchost.com 2696 5B2288~1.EXE 3164 svchost.com 3948 5B2288~1.EXE 4312 svchost.com 4020 5B2288~1.EXE 1604 svchost.com 4172 5B2288~1.EXE 4420 svchost.com 2440 5B2288~1.EXE 1104 svchost.com 4060 5B2288~1.EXE 3860 svchost.com 1136 5B2288~1.EXE 3228 svchost.com 3652 5B2288~1.EXE 1920 svchost.com 3436 5B2288~1.EXE 3364 svchost.com 1156 5B2288~1.EXE 3740 svchost.com 2084 5B2288~1.EXE 1300 svchost.com 3236 5B2288~1.EXE 4244 svchost.com 1976 5B2288~1.EXE 2044 svchost.com 4696 5B2288~1.EXE 2436 svchost.com 2700 5B2288~1.EXE 1504 svchost.com 3064 5B2288~1.EXE 2032 svchost.com 4880 5B2288~1.EXE 1648 svchost.com 4876 5B2288~1.EXE 4680 svchost.com 3788 5B2288~1.EXE 2120 svchost.com 2344 5B2288~1.EXE 3736 svchost.com 324 5B2288~1.EXE 3960 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 5B2288~1.EXE File opened for modification C:\Windows\svchost.com 5B2288~1.EXE File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\svchost.com 5B2288~1.EXE File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\svchost.com 5B2288~1.EXE File opened for modification C:\Windows\svchost.com 5B2288~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 5B2288~1.EXE File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 5B2288~1.EXE File opened for modification C:\Windows\svchost.com 5B2288~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 5B2288~1.EXE File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\svchost.com 5B2288~1.EXE File opened for modification C:\Windows\svchost.com 5B2288~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\svchost.com 5B2288~1.EXE File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\svchost.com 5B2288~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 5B2288~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 5B2288~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4056 876 WerFault.exe 362 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5B2288~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 5B2288~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2568 2392 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe 82 PID 2392 wrote to memory of 2568 2392 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe 82 PID 2392 wrote to memory of 2568 2392 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe 82 PID 2568 wrote to memory of 1112 2568 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe 83 PID 2568 wrote to memory of 1112 2568 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe 83 PID 2568 wrote to memory of 1112 2568 5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe 83 PID 1112 wrote to memory of 3312 1112 svchost.com 84 PID 1112 wrote to memory of 3312 1112 svchost.com 84 PID 1112 wrote to memory of 3312 1112 svchost.com 84 PID 3312 wrote to memory of 380 3312 5B2288~1.EXE 85 PID 3312 wrote to memory of 380 3312 5B2288~1.EXE 85 PID 3312 wrote to memory of 380 3312 5B2288~1.EXE 85 PID 380 wrote to memory of 3768 380 svchost.com 86 PID 380 wrote to memory of 3768 380 svchost.com 86 PID 380 wrote to memory of 3768 380 svchost.com 86 PID 3768 wrote to memory of 4688 3768 5B2288~1.EXE 87 PID 3768 wrote to memory of 4688 3768 5B2288~1.EXE 87 PID 3768 wrote to memory of 4688 3768 5B2288~1.EXE 87 PID 4688 wrote to memory of 3652 4688 svchost.com 118 PID 4688 wrote to memory of 3652 4688 svchost.com 118 PID 4688 wrote to memory of 3652 4688 svchost.com 118 PID 3652 wrote to memory of 2388 3652 5B2288~1.EXE 89 PID 3652 wrote to memory of 2388 3652 5B2288~1.EXE 89 PID 3652 wrote to memory of 2388 3652 5B2288~1.EXE 89 PID 2388 wrote to memory of 3436 2388 svchost.com 120 PID 2388 wrote to memory of 3436 2388 svchost.com 120 PID 2388 wrote to memory of 3436 2388 svchost.com 120 PID 3436 wrote to memory of 4508 3436 5B2288~1.EXE 91 PID 3436 wrote to memory of 4508 3436 5B2288~1.EXE 91 PID 3436 wrote to memory of 4508 3436 5B2288~1.EXE 91 PID 4508 wrote to memory of 1156 4508 svchost.com 122 PID 4508 wrote to memory of 1156 4508 svchost.com 122 PID 4508 wrote to memory of 1156 4508 svchost.com 122 PID 1156 wrote to memory of 3888 1156 5B2288~1.EXE 93 PID 1156 wrote to memory of 3888 1156 5B2288~1.EXE 93 PID 1156 wrote to memory of 3888 1156 5B2288~1.EXE 93 PID 3888 wrote to memory of 1564 3888 svchost.com 94 PID 3888 wrote to memory of 1564 3888 svchost.com 94 PID 3888 wrote to memory of 1564 3888 svchost.com 94 PID 1564 wrote to memory of 2712 1564 5B2288~1.EXE 95 PID 1564 wrote to memory of 2712 1564 5B2288~1.EXE 95 PID 1564 wrote to memory of 2712 1564 5B2288~1.EXE 95 PID 2712 wrote to memory of 2044 2712 svchost.com 129 PID 2712 wrote to memory of 2044 2712 svchost.com 129 PID 2712 wrote to memory of 2044 2712 svchost.com 129 PID 2044 wrote to memory of 760 2044 5B2288~1.EXE 97 PID 2044 wrote to memory of 760 2044 5B2288~1.EXE 97 PID 2044 wrote to memory of 760 2044 5B2288~1.EXE 97 PID 760 wrote to memory of 4524 760 svchost.com 98 PID 760 wrote to memory of 4524 760 svchost.com 98 PID 760 wrote to memory of 4524 760 svchost.com 98 PID 4524 wrote to memory of 2284 4524 5B2288~1.EXE 99 PID 4524 wrote to memory of 2284 4524 5B2288~1.EXE 99 PID 4524 wrote to memory of 2284 4524 5B2288~1.EXE 99 PID 2284 wrote to memory of 4068 2284 svchost.com 100 PID 2284 wrote to memory of 4068 2284 svchost.com 100 PID 2284 wrote to memory of 4068 2284 svchost.com 100 PID 4068 wrote to memory of 876 4068 5B2288~1.EXE 101 PID 4068 wrote to memory of 876 4068 5B2288~1.EXE 101 PID 4068 wrote to memory of 876 4068 5B2288~1.EXE 101 PID 876 wrote to memory of 2236 876 svchost.com 102 PID 876 wrote to memory of 2236 876 svchost.com 102 PID 876 wrote to memory of 2236 876 svchost.com 102 PID 2236 wrote to memory of 2556 2236 5B2288~1.EXE 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe"C:\Users\Admin\AppData\Local\Temp\5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\5b22885aa0b352683fcc4c2d27a58bca4c8f229de1d2d36cf419cb625985f060N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE18⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"29⤵
- Executes dropped EXE
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"31⤵
- Executes dropped EXE
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE32⤵
- Executes dropped EXE
- Modifies registry class
PID:2440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE34⤵
- Executes dropped EXE
PID:4060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"35⤵
- Executes dropped EXE
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"37⤵
- Executes dropped EXE
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"39⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"41⤵
- Executes dropped EXE
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"43⤵
- Executes dropped EXE
PID:3740 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"45⤵
- Executes dropped EXE
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"47⤵
- Executes dropped EXE
PID:4244 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE48⤵
- Executes dropped EXE
- Modifies registry class
PID:1976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"49⤵
- Executes dropped EXE
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"51⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"53⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE54⤵
- Executes dropped EXE
- Modifies registry class
PID:3064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"57⤵
- Executes dropped EXE
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE58⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE60⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3788 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"61⤵
- Executes dropped EXE
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE62⤵
- Executes dropped EXE
PID:2344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"63⤵
- Executes dropped EXE
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE64⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"65⤵
- Executes dropped EXE
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE66⤵PID:4664
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"67⤵
- Drops file in Windows directory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE68⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"69⤵PID:4672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE70⤵
- Checks computer location settings
- Modifies registry class
PID:2936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"71⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE72⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE74⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:64 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE76⤵PID:928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"77⤵PID:4504
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE78⤵PID:3172
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"79⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE80⤵
- Checks computer location settings
PID:4508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"81⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE82⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"83⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE84⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"85⤵
- Drops file in Windows directory
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE86⤵
- System Location Discovery: System Language Discovery
PID:1376 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"87⤵
- System Location Discovery: System Language Discovery
PID:1280 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE88⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"89⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE90⤵
- Modifies registry class
PID:1964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"91⤵
- Drops file in Windows directory
PID:724 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE92⤵PID:4676
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"93⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE94⤵PID:3516
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"95⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE96⤵
- Checks computer location settings
- Modifies registry class
PID:2116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"97⤵PID:5056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE98⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"99⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE100⤵PID:4272
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"101⤵PID:4680
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE102⤵PID:4128
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"103⤵
- Drops file in Windows directory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE104⤵PID:2120
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"105⤵PID:5048
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE106⤵PID:3088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"107⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE108⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"109⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE110⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"111⤵
- Drops file in Windows directory
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE112⤵PID:4384
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"113⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE114⤵
- System Location Discovery: System Language Discovery
PID:4388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"115⤵PID:3608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE116⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"117⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE118⤵
- Drops file in Windows directory
PID:3332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"119⤵
- Drops file in Windows directory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE120⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE"121⤵
- System Location Discovery: System Language Discovery
PID:4252 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5B2288~1.EXE122⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3768
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-