Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-01-2025 07:27
Behavioral task
behavioral1
Sample
65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe
Resource
win10v2004-20241007-en
General
-
Target
65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe
-
Size
360KB
-
MD5
7ced1050d7e0ed0f9f44b1b261b93be0
-
SHA1
691430c1c8678bbbbf44a8be7237971911f5679f
-
SHA256
65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756a
-
SHA512
97fa4ed211885e4a8906712660d18603932712ff7bd5fe189c5b1564565a907861604ccf0558678e3617f254b4266a268caf3d4bcafcd4d17259a454ca4d0afb
-
SSDEEP
6144:k9ZWxpNzfEsKQo9PiF+/rMbe1/o1ZAOvK8ZJqOpiSHJpls4Yn7/n+qaWRSBVYAgN:7pNbEpQo9PRo1ZtvqOpxHJpls4Yn7/nQ
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000b000000023b8e-4.dat family_neshta behavioral2/files/0x000a000000023b93-10.dat family_neshta behavioral2/memory/212-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3052-20-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3240-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1340-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4476-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3272-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1872-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4544-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4792-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2516-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4492-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2460-87-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000600000002023a-93.dat family_neshta behavioral2/files/0x0006000000020232-92.dat family_neshta behavioral2/memory/5000-108-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000202c3-107.dat family_neshta behavioral2/files/0x0004000000020352-106.dat family_neshta behavioral2/memory/1160-126-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020249-116.dat family_neshta behavioral2/files/0x0004000000020325-115.dat family_neshta behavioral2/files/0x00010000000202ab-114.dat family_neshta behavioral2/memory/464-127-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3880-138-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1172-139-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2272-143-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214f7-165.dat family_neshta behavioral2/files/0x00010000000214f6-162.dat family_neshta behavioral2/files/0x00010000000214f5-161.dat family_neshta behavioral2/memory/4220-171-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5016-182-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f51-168.dat family_neshta behavioral2/files/0x0001000000022f52-184.dat family_neshta behavioral2/files/0x0001000000016852-200.dat family_neshta behavioral2/files/0x00010000000167c6-199.dat family_neshta behavioral2/files/0x00010000000167c8-198.dat family_neshta behavioral2/memory/4828-193-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167ff-192.dat family_neshta behavioral2/memory/4680-204-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4364-234-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4896-241-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3276-256-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2060-258-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4824-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1696-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4532-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1896-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4604-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3624-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3264-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2924-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5116-304-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4208-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2488-312-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4144-314-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1472-320-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2396-327-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4812-328-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2092-330-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1012-336-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1180-338-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3236-344-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4924-350-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation 65ECC7~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 1540 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 212 svchost.com 3052 65ECC7~1.EXE 3240 svchost.com 1340 65ECC7~1.EXE 4476 svchost.com 3272 65ECC7~1.EXE 1872 svchost.com 4544 65ECC7~1.EXE 4792 svchost.com 2516 65ECC7~1.EXE 4492 svchost.com 2460 65ECC7~1.EXE 5000 svchost.com 1160 65ECC7~1.EXE 464 svchost.com 3880 65ECC7~1.EXE 1172 svchost.com 2272 65ECC7~1.EXE 4220 svchost.com 5016 65ECC7~1.EXE 4828 svchost.com 4680 65ECC7~1.EXE 4364 svchost.com 4896 65ECC7~1.EXE 3276 svchost.com 2060 65ECC7~1.EXE 4824 svchost.com 1696 65ECC7~1.EXE 4532 svchost.com 1896 65ECC7~1.EXE 4604 svchost.com 3624 65ECC7~1.EXE 3264 svchost.com 2924 65ECC7~1.EXE 5116 svchost.com 4208 65ECC7~1.EXE 2488 svchost.com 4144 65ECC7~1.EXE 1472 svchost.com 2396 65ECC7~1.EXE 4812 svchost.com 2092 65ECC7~1.EXE 1012 svchost.com 1180 65ECC7~1.EXE 3236 svchost.com 4924 65ECC7~1.EXE 1912 svchost.com 4840 65ECC7~1.EXE 4224 svchost.com 4944 65ECC7~1.EXE 4504 svchost.com 2088 65ECC7~1.EXE 4908 svchost.com 4384 65ECC7~1.EXE 4876 svchost.com 408 65ECC7~1.EXE 4680 svchost.com 4584 65ECC7~1.EXE 2584 svchost.com 808 65ECC7~1.EXE 3112 svchost.com 3016 65ECC7~1.EXE 324 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaws.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 65ECC7~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 65ECC7~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE Key created \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000_Classes\Local Settings 65ECC7~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 856 wrote to memory of 1540 856 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 83 PID 856 wrote to memory of 1540 856 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 83 PID 856 wrote to memory of 1540 856 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 83 PID 1540 wrote to memory of 212 1540 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 84 PID 1540 wrote to memory of 212 1540 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 84 PID 1540 wrote to memory of 212 1540 65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe 84 PID 212 wrote to memory of 3052 212 svchost.com 85 PID 212 wrote to memory of 3052 212 svchost.com 85 PID 212 wrote to memory of 3052 212 svchost.com 85 PID 3052 wrote to memory of 3240 3052 65ECC7~1.EXE 86 PID 3052 wrote to memory of 3240 3052 65ECC7~1.EXE 86 PID 3052 wrote to memory of 3240 3052 65ECC7~1.EXE 86 PID 3240 wrote to memory of 1340 3240 svchost.com 87 PID 3240 wrote to memory of 1340 3240 svchost.com 87 PID 3240 wrote to memory of 1340 3240 svchost.com 87 PID 1340 wrote to memory of 4476 1340 65ECC7~1.EXE 88 PID 1340 wrote to memory of 4476 1340 65ECC7~1.EXE 88 PID 1340 wrote to memory of 4476 1340 65ECC7~1.EXE 88 PID 4476 wrote to memory of 3272 4476 svchost.com 89 PID 4476 wrote to memory of 3272 4476 svchost.com 89 PID 4476 wrote to memory of 3272 4476 svchost.com 89 PID 3272 wrote to memory of 1872 3272 65ECC7~1.EXE 90 PID 3272 wrote to memory of 1872 3272 65ECC7~1.EXE 90 PID 3272 wrote to memory of 1872 3272 65ECC7~1.EXE 90 PID 1872 wrote to memory of 4544 1872 svchost.com 91 PID 1872 wrote to memory of 4544 1872 svchost.com 91 PID 1872 wrote to memory of 4544 1872 svchost.com 91 PID 4544 wrote to memory of 4792 4544 65ECC7~1.EXE 156 PID 4544 wrote to memory of 4792 4544 65ECC7~1.EXE 156 PID 4544 wrote to memory of 4792 4544 65ECC7~1.EXE 156 PID 4792 wrote to memory of 2516 4792 svchost.com 93 PID 4792 wrote to memory of 2516 4792 svchost.com 93 PID 4792 wrote to memory of 2516 4792 svchost.com 93 PID 2516 wrote to memory of 4492 2516 65ECC7~1.EXE 94 PID 2516 wrote to memory of 4492 2516 65ECC7~1.EXE 94 PID 2516 wrote to memory of 4492 2516 65ECC7~1.EXE 94 PID 4492 wrote to memory of 2460 4492 svchost.com 95 PID 4492 wrote to memory of 2460 4492 svchost.com 95 PID 4492 wrote to memory of 2460 4492 svchost.com 95 PID 2460 wrote to memory of 5000 2460 65ECC7~1.EXE 96 PID 2460 wrote to memory of 5000 2460 65ECC7~1.EXE 96 PID 2460 wrote to memory of 5000 2460 65ECC7~1.EXE 96 PID 5000 wrote to memory of 1160 5000 svchost.com 97 PID 5000 wrote to memory of 1160 5000 svchost.com 97 PID 5000 wrote to memory of 1160 5000 svchost.com 97 PID 1160 wrote to memory of 464 1160 65ECC7~1.EXE 98 PID 1160 wrote to memory of 464 1160 65ECC7~1.EXE 98 PID 1160 wrote to memory of 464 1160 65ECC7~1.EXE 98 PID 464 wrote to memory of 3880 464 svchost.com 99 PID 464 wrote to memory of 3880 464 svchost.com 99 PID 464 wrote to memory of 3880 464 svchost.com 99 PID 3880 wrote to memory of 1172 3880 65ECC7~1.EXE 100 PID 3880 wrote to memory of 1172 3880 65ECC7~1.EXE 100 PID 3880 wrote to memory of 1172 3880 65ECC7~1.EXE 100 PID 1172 wrote to memory of 2272 1172 svchost.com 101 PID 1172 wrote to memory of 2272 1172 svchost.com 101 PID 1172 wrote to memory of 2272 1172 svchost.com 101 PID 2272 wrote to memory of 4220 2272 65ECC7~1.EXE 102 PID 2272 wrote to memory of 4220 2272 65ECC7~1.EXE 102 PID 2272 wrote to memory of 4220 2272 65ECC7~1.EXE 102 PID 4220 wrote to memory of 5016 4220 svchost.com 103 PID 4220 wrote to memory of 5016 4220 svchost.com 103 PID 4220 wrote to memory of 5016 4220 svchost.com 103 PID 5016 wrote to memory of 4828 5016 65ECC7~1.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe"C:\Users\Admin\AppData\Local\Temp\65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\65ecc7b84d0bfbb3f0e27eb1051b827878d9c05cf33e400a377ab6db3f5f756aN.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE12⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"17⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"19⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"23⤵
- Executes dropped EXE
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4680 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"25⤵
- Executes dropped EXE
PID:4364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
PID:3624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"35⤵
- Executes dropped EXE
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE36⤵
- Executes dropped EXE
- Modifies registry class
PID:2924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"37⤵
- Executes dropped EXE
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE38⤵
- Executes dropped EXE
- Modifies registry class
PID:4208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"39⤵
- Executes dropped EXE
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE40⤵
- Executes dropped EXE
PID:4144 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE42⤵
- Executes dropped EXE
PID:2396 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"43⤵
- Executes dropped EXE
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"45⤵
- Executes dropped EXE
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"47⤵
- Executes dropped EXE
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
PID:4924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE50⤵
- Executes dropped EXE
- Modifies registry class
PID:4840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"51⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE52⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"55⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"57⤵
- Executes dropped EXE
PID:4876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:408 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
PID:4584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
PID:808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"63⤵
- Executes dropped EXE
PID:3112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE64⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"65⤵
- Executes dropped EXE
PID:324 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE66⤵
- Modifies registry class
PID:3024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"67⤵PID:3776
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE68⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"69⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE70⤵PID:3956
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"71⤵
- Drops file in Windows directory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE72⤵
- Checks computer location settings
PID:4604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"73⤵
- Drops file in Windows directory
PID:3224 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE74⤵
- Checks computer location settings
- Modifies registry class
PID:4656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"75⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE76⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE78⤵
- System Location Discovery: System Language Discovery
PID:3980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"79⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE80⤵
- Checks computer location settings
PID:2756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"81⤵
- Drops file in Windows directory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE82⤵PID:2768
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"83⤵PID:3760
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE84⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:1012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"85⤵PID:3572
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE86⤵
- Drops file in Windows directory
PID:2904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"87⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE88⤵PID:1252
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"89⤵PID:4452
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE90⤵
- System Location Discovery: System Language Discovery
PID:4840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"91⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE92⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:4248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"93⤵
- System Location Discovery: System Language Discovery
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE94⤵
- Checks computer location settings
PID:2364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"95⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE96⤵
- Modifies registry class
PID:3564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"97⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE98⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"99⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE100⤵
- Modifies registry class
PID:5068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"101⤵PID:3812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE102⤵
- Modifies registry class
PID:1932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"103⤵PID:3240
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE104⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:3712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"105⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE106⤵PID:3024
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"107⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE108⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"109⤵
- System Location Discovery: System Language Discovery
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE110⤵
- Checks computer location settings
- Modifies registry class
PID:1612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"111⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE112⤵
- Checks computer location settings
- Modifies registry class
PID:4604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"113⤵
- Drops file in Windows directory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE114⤵
- Checks computer location settings
- Modifies registry class
PID:4636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"115⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE116⤵
- Checks computer location settings
PID:5020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE118⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"119⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE120⤵
- Checks computer location settings
- Modifies registry class
PID:4780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE"121⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\65ECC7~1.EXE122⤵PID:2344
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-