Analysis
-
max time kernel
92s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2025 15:36
Behavioral task
behavioral1
Sample
927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe
Resource
win10v2004-20241007-en
General
-
Target
927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe
-
Size
3.5MB
-
MD5
e67f1d45faeeaf090828146717416f10
-
SHA1
fc3373d369f1a771f249ed32133318c4396f5391
-
SHA256
927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9
-
SHA512
d20c82fa7a0e7993fca0ec23cfda08b1f44e01a6f5edc39056618ab4c020bb9630b5b5794de0f1bf7ba17a9c64ba715ab0e77a35145b386fafc77731c0b35cf7
-
SSDEEP
24576:6eaedDJh+YAu35naNirXqlG2qSOuaRc3uS2ORNGaqWXcPEfkk8qsuqfNxfnPaXa:62JdqmS2ORJdc8fqVuiNF
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0008000000023bcc-4.dat family_neshta behavioral2/files/0x0009000000023bd1-10.dat family_neshta behavioral2/memory/4828-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1496-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2604-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2660-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3228-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2620-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5052-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5060-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1688-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3056-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020368-81.dat family_neshta behavioral2/files/0x000100000002024a-90.dat family_neshta behavioral2/files/0x000400000002035a-89.dat family_neshta behavioral2/files/0x00010000000202cc-95.dat family_neshta behavioral2/files/0x0006000000020250-103.dat family_neshta behavioral2/memory/2868-113-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002032e-102.dat family_neshta behavioral2/memory/3348-98-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002035b-94.dat family_neshta behavioral2/files/0x0006000000020237-88.dat family_neshta behavioral2/files/0x0006000000020241-86.dat family_neshta behavioral2/files/0x0006000000020157-85.dat family_neshta behavioral2/files/0x00070000000202a3-84.dat family_neshta behavioral2/memory/2692-115-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3224-126-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000021554-133.dat family_neshta behavioral2/files/0x0002000000020332-132.dat family_neshta behavioral2/files/0x0001000000021501-142.dat family_neshta behavioral2/files/0x0001000000021500-139.dat family_neshta behavioral2/files/0x00010000000214ff-138.dat family_neshta behavioral2/files/0x0001000000022f56-146.dat family_neshta behavioral2/files/0x0001000000022f52-147.dat family_neshta behavioral2/memory/228-164-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167cb-173.dat family_neshta behavioral2/files/0x00010000000167f1-172.dat family_neshta behavioral2/files/0x000100000001dbb9-175.dat family_neshta behavioral2/files/0x0001000000016921-187.dat family_neshta behavioral2/memory/1348-216-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000300000001e8f4-200.dat family_neshta behavioral2/files/0x000300000001e8a3-199.dat family_neshta behavioral2/files/0x000400000001e5ff-198.dat family_neshta behavioral2/files/0x00020000000215f2-197.dat family_neshta behavioral2/files/0x0002000000000729-195.dat family_neshta behavioral2/memory/1008-232-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4588-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4812-240-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/628-247-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4660-248-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2640-250-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3356-256-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4788-258-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3100-264-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2288-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4384-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2504-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4416-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3968-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5024-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1840-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1908-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3228-298-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1668-304-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 927E4F~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 1040 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe 4828 svchost.com 1496 927E4F~1.EXE 2604 svchost.com 2660 927E4F~1.EXE 3228 svchost.com 2620 927E4F~1.EXE 5052 svchost.com 5060 927E4F~1.EXE 1688 svchost.com 3056 927E4F~1.EXE 3348 svchost.com 2868 927E4F~1.EXE 2692 svchost.com 3224 927E4F~1.EXE 228 svchost.com 1348 927E4F~1.EXE 1008 svchost.com 4588 927E4F~1.EXE 4812 svchost.com 628 927E4F~1.EXE 4660 svchost.com 2640 927E4F~1.EXE 3356 svchost.com 4788 927E4F~1.EXE 3100 svchost.com 2288 927E4F~1.EXE 4384 svchost.com 2504 927E4F~1.EXE 4416 svchost.com 3968 927E4F~1.EXE 5024 svchost.com 1840 927E4F~1.EXE 1908 svchost.com 3228 927E4F~1.EXE 1668 svchost.com 4184 927E4F~1.EXE 3608 svchost.com 5060 927E4F~1.EXE 1344 svchost.com 4632 927E4F~1.EXE 3384 svchost.com 3068 927E4F~1.EXE 1696 svchost.com 4156 927E4F~1.EXE 1640 svchost.com 4412 927E4F~1.EXE 1980 svchost.com 4892 927E4F~1.EXE 5016 svchost.com 1208 927E4F~1.EXE 3932 svchost.com 540 927E4F~1.EXE 728 svchost.com 3032 927E4F~1.EXE 1996 svchost.com 3468 927E4F~1.EXE 4560 svchost.com 896 927E4F~1.EXE 1064 svchost.com 2524 927E4F~1.EXE 4876 svchost.com 4116 927E4F~1.EXE 1412 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaws.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys 927E4F~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 927E4F~1.EXE File opened for modification C:\Windows\directx.sys 927E4F~1.EXE File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\directx.sys 927E4F~1.EXE File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\directx.sys 927E4F~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 927E4F~1.EXE File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\directx.sys 927E4F~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 927E4F~1.EXE File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 927E4F~1.EXE File opened for modification C:\Windows\directx.sys 927E4F~1.EXE File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\directx.sys 927E4F~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 927E4F~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 927E4F~1.EXE File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\svchost.com 927E4F~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 927E4F~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 927E4F~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 927E4F~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4504 wrote to memory of 1040 4504 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe 82 PID 4504 wrote to memory of 1040 4504 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe 82 PID 4504 wrote to memory of 1040 4504 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe 82 PID 1040 wrote to memory of 4828 1040 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe 83 PID 1040 wrote to memory of 4828 1040 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe 83 PID 1040 wrote to memory of 4828 1040 927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe 83 PID 4828 wrote to memory of 1496 4828 svchost.com 84 PID 4828 wrote to memory of 1496 4828 svchost.com 84 PID 4828 wrote to memory of 1496 4828 svchost.com 84 PID 1496 wrote to memory of 2604 1496 927E4F~1.EXE 85 PID 1496 wrote to memory of 2604 1496 927E4F~1.EXE 85 PID 1496 wrote to memory of 2604 1496 927E4F~1.EXE 85 PID 2604 wrote to memory of 2660 2604 svchost.com 86 PID 2604 wrote to memory of 2660 2604 svchost.com 86 PID 2604 wrote to memory of 2660 2604 svchost.com 86 PID 2660 wrote to memory of 3228 2660 927E4F~1.EXE 116 PID 2660 wrote to memory of 3228 2660 927E4F~1.EXE 116 PID 2660 wrote to memory of 3228 2660 927E4F~1.EXE 116 PID 3228 wrote to memory of 2620 3228 svchost.com 88 PID 3228 wrote to memory of 2620 3228 svchost.com 88 PID 3228 wrote to memory of 2620 3228 svchost.com 88 PID 2620 wrote to memory of 5052 2620 927E4F~1.EXE 89 PID 2620 wrote to memory of 5052 2620 927E4F~1.EXE 89 PID 2620 wrote to memory of 5052 2620 927E4F~1.EXE 89 PID 5052 wrote to memory of 5060 5052 svchost.com 120 PID 5052 wrote to memory of 5060 5052 svchost.com 120 PID 5052 wrote to memory of 5060 5052 svchost.com 120 PID 5060 wrote to memory of 1688 5060 927E4F~1.EXE 91 PID 5060 wrote to memory of 1688 5060 927E4F~1.EXE 91 PID 5060 wrote to memory of 1688 5060 927E4F~1.EXE 91 PID 1688 wrote to memory of 3056 1688 svchost.com 92 PID 1688 wrote to memory of 3056 1688 svchost.com 92 PID 1688 wrote to memory of 3056 1688 svchost.com 92 PID 3056 wrote to memory of 3348 3056 927E4F~1.EXE 93 PID 3056 wrote to memory of 3348 3056 927E4F~1.EXE 93 PID 3056 wrote to memory of 3348 3056 927E4F~1.EXE 93 PID 3348 wrote to memory of 2868 3348 svchost.com 94 PID 3348 wrote to memory of 2868 3348 svchost.com 94 PID 3348 wrote to memory of 2868 3348 svchost.com 94 PID 2868 wrote to memory of 2692 2868 927E4F~1.EXE 95 PID 2868 wrote to memory of 2692 2868 927E4F~1.EXE 95 PID 2868 wrote to memory of 2692 2868 927E4F~1.EXE 95 PID 2692 wrote to memory of 3224 2692 svchost.com 173 PID 2692 wrote to memory of 3224 2692 svchost.com 173 PID 2692 wrote to memory of 3224 2692 svchost.com 173 PID 3224 wrote to memory of 228 3224 927E4F~1.EXE 97 PID 3224 wrote to memory of 228 3224 927E4F~1.EXE 97 PID 3224 wrote to memory of 228 3224 927E4F~1.EXE 97 PID 228 wrote to memory of 1348 228 svchost.com 98 PID 228 wrote to memory of 1348 228 svchost.com 98 PID 228 wrote to memory of 1348 228 svchost.com 98 PID 1348 wrote to memory of 1008 1348 927E4F~1.EXE 99 PID 1348 wrote to memory of 1008 1348 927E4F~1.EXE 99 PID 1348 wrote to memory of 1008 1348 927E4F~1.EXE 99 PID 1008 wrote to memory of 4588 1008 svchost.com 100 PID 1008 wrote to memory of 4588 1008 svchost.com 100 PID 1008 wrote to memory of 4588 1008 svchost.com 100 PID 4588 wrote to memory of 4812 4588 927E4F~1.EXE 101 PID 4588 wrote to memory of 4812 4588 927E4F~1.EXE 101 PID 4588 wrote to memory of 4812 4588 927E4F~1.EXE 101 PID 4812 wrote to memory of 628 4812 svchost.com 102 PID 4812 wrote to memory of 628 4812 svchost.com 102 PID 4812 wrote to memory of 628 4812 svchost.com 102 PID 628 wrote to memory of 4660 628 927E4F~1.EXE 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe"C:\Users\Admin\AppData\Local\Temp\927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\927e4fd8addaa8f4e3cfb9b68f9f2184f1832a5f458feeb95ee388e5b7c65ae9N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"17⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE24⤵
- Executes dropped EXE
PID:2640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"25⤵
- Executes dropped EXE
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4788 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"27⤵
- Executes dropped EXE
PID:3100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"29⤵
- Executes dropped EXE
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
PID:2504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"31⤵
- Executes dropped EXE
PID:4416 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE34⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE40⤵
- Executes dropped EXE
PID:5060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1344 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE42⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE46⤵
- Executes dropped EXE
PID:4156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"47⤵
- Executes dropped EXE
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE48⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"51⤵
- Executes dropped EXE
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"53⤵
- Executes dropped EXE
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE54⤵
- Executes dropped EXE
PID:540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"55⤵
- Executes dropped EXE
PID:728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"57⤵
- Executes dropped EXE
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
PID:3468 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
PID:896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"63⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"65⤵
- Executes dropped EXE
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE66⤵
- Checks computer location settings
- Drops file in Windows directory
PID:372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"67⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE68⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4788 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"69⤵PID:4552
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE70⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:4024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"71⤵PID:760
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE72⤵
- Drops file in Windows directory
PID:2548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"73⤵PID:3664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE74⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:1576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"75⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE76⤵PID:1840
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"77⤵
- Drops file in Windows directory
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE78⤵
- Checks computer location settings
- Modifies registry class
PID:2064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"79⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE80⤵
- Checks computer location settings
PID:224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"81⤵
- System Location Discovery: System Language Discovery
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE82⤵
- Checks computer location settings
- Modifies registry class
PID:1552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"83⤵
- Drops file in Windows directory
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE84⤵PID:3120
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"85⤵PID:1556
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE86⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"87⤵PID:5092
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE88⤵
- Modifies registry class
PID:3044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"89⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE90⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"91⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE92⤵
- Modifies registry class
PID:1640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"93⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE94⤵
- Checks computer location settings
- Modifies registry class
PID:960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"95⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE96⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"97⤵
- Drops file in Windows directory
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE98⤵
- Modifies registry class
PID:4616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE100⤵
- Modifies registry class
PID:2456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"101⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE102⤵
- Modifies registry class
PID:3256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"103⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE104⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"105⤵
- Drops file in Windows directory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE106⤵PID:3240
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"107⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE108⤵
- Modifies registry class
PID:4092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"109⤵PID:4408
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE110⤵
- Modifies registry class
PID:2736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:4116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE112⤵
- Drops file in Windows directory
- Modifies registry class
PID:3476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"113⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE114⤵
- Checks computer location settings
- Modifies registry class
PID:3944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"115⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE116⤵
- Checks computer location settings
PID:4268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"117⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE118⤵
- Modifies registry class
PID:4416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"119⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE120⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:4032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE"121⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\927E4F~1.EXE122⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2292
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-