Analysis
-
max time kernel
33s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 03:00
Behavioral task
behavioral1
Sample
c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe
Resource
win10v2004-20241007-en
General
-
Target
c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe
-
Size
1.9MB
-
MD5
92f3d1d15ba772bd14dc2316915b7e00
-
SHA1
7268cbe49243e8125c9540b9f6d91e5e1a77e8b8
-
SHA256
c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480
-
SHA512
4f5ec39e45334290a8c435b6ba6865916efbf50eb5a9c5b84b684540d004119c24c1dde0a1a2a56535975f953a0861bf4b2fccc57307a62dd7c2d4be473ba7b9
-
SSDEEP
49152:5W+KX91+mP9BzpyLbv98QuyyPhNqxMXkUcLg2HyqbAa:fKX91+mP7zpyLbv98QuyyPhgxMXkUsgV
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0007000000023c59-4.dat family_neshta behavioral2/files/0x0007000000023c5a-11.dat family_neshta behavioral2/memory/4972-18-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3064-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3488-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5012-41-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4428-53-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3988-42-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1092-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1256-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3720-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1248-77-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4644-89-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3464-78-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020348-107.dat family_neshta behavioral2/memory/1392-113-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2364-117-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2556-125-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2524-136-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4000-137-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1368-148-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3580-149-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4868-160-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214d9-174.dat family_neshta behavioral2/files/0x00010000000214d8-177.dat family_neshta behavioral2/files/0x00010000000214da-176.dat family_neshta behavioral2/files/0x0001000000022f2a-185.dat family_neshta behavioral2/files/0x00010000000167af-206.dat family_neshta behavioral2/files/0x0001000000016801-205.dat family_neshta behavioral2/files/0x0001000000022f6d-201.dat family_neshta behavioral2/files/0x000100000001dbd1-220.dat family_neshta behavioral2/files/0x0001000000016918-233.dat family_neshta behavioral2/files/0x0001000000016915-230.dat family_neshta behavioral2/memory/3204-191-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4684-170-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4676-240-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000b00000001e614-249.dat family_neshta behavioral2/memory/2708-262-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000001e6aa-245.dat family_neshta behavioral2/memory/2652-263-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4804-273-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2592-276-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5108-283-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3988-291-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4836-293-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/492-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4044-301-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4896-307-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2268-309-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4492-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5100-317-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1012-323-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1936-330-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2368-331-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2276-338-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3252-339-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4652-341-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3556-347-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4316-354-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2216-355-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4000-357-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4032-363-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5060-370-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3384-371-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation C85F4D~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 1144 c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe 4972 svchost.com 3064 C85F4D~1.EXE 3488 svchost.com 5012 C85F4D~1.EXE 3988 svchost.com 4428 C85F4D~1.EXE 1092 svchost.com 1256 C85F4D~1.EXE 3720 svchost.com 1248 C85F4D~1.EXE 3464 svchost.com 4644 C85F4D~1.EXE 1392 svchost.com 2364 C85F4D~1.EXE 2556 svchost.com 2524 C85F4D~1.EXE 4000 svchost.com 1368 C85F4D~1.EXE 3580 svchost.com 4868 C85F4D~1.EXE 4684 svchost.com 3204 C85F4D~1.EXE 4676 svchost.com 2708 C85F4D~1.EXE 2652 svchost.com 4804 C85F4D~1.EXE 2592 svchost.com 5108 C85F4D~1.EXE 3988 svchost.com 4836 C85F4D~1.EXE 492 svchost.com 4044 C85F4D~1.EXE 4896 svchost.com 2268 C85F4D~1.EXE 4492 svchost.com 5100 C85F4D~1.EXE 1012 svchost.com 1936 C85F4D~1.EXE 2368 svchost.com 2276 C85F4D~1.EXE 3252 svchost.com 4652 C85F4D~1.EXE 3556 svchost.com 4316 C85F4D~1.EXE 2216 svchost.com 4000 C85F4D~1.EXE 4032 svchost.com 5060 C85F4D~1.EXE 3384 svchost.com 404 C85F4D~1.EXE 2880 svchost.com 4196 C85F4D~1.EXE 2104 svchost.com 824 C85F4D~1.EXE 4352 svchost.com 1172 C85F4D~1.EXE 2992 svchost.com 1404 C85F4D~1.EXE 1656 svchost.com 1304 C85F4D~1.EXE 4772 svchost.com 3244 C85F4D~1.EXE 4980 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys C85F4D~1.EXE File opened for modification C:\Windows\svchost.com C85F4D~1.EXE File opened for modification C:\Windows\svchost.com C85F4D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com C85F4D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com C85F4D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com C85F4D~1.EXE File opened for modification C:\Windows\svchost.com C85F4D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com C85F4D~1.EXE File opened for modification C:\Windows\directx.sys C85F4D~1.EXE File opened for modification C:\Windows\svchost.com C85F4D~1.EXE File opened for modification C:\Windows\svchost.com C85F4D~1.EXE File opened for modification C:\Windows\directx.sys C85F4D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys C85F4D~1.EXE File opened for modification C:\Windows\directx.sys C85F4D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys C85F4D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com C85F4D~1.EXE File opened for modification C:\Windows\directx.sys C85F4D~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com C85F4D~1.EXE File opened for modification C:\Windows\directx.sys C85F4D~1.EXE File opened for modification C:\Windows\directx.sys C85F4D~1.EXE File opened for modification C:\Windows\directx.sys C85F4D~1.EXE File opened for modification C:\Windows\directx.sys C85F4D~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys C85F4D~1.EXE File opened for modification C:\Windows\svchost.com C85F4D~1.EXE File opened for modification C:\Windows\svchost.com C85F4D~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C85F4D~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings C85F4D~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4636 wrote to memory of 1144 4636 c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe 83 PID 4636 wrote to memory of 1144 4636 c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe 83 PID 4636 wrote to memory of 1144 4636 c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe 83 PID 1144 wrote to memory of 4972 1144 c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe 84 PID 1144 wrote to memory of 4972 1144 c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe 84 PID 1144 wrote to memory of 4972 1144 c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe 84 PID 4972 wrote to memory of 3064 4972 svchost.com 85 PID 4972 wrote to memory of 3064 4972 svchost.com 85 PID 4972 wrote to memory of 3064 4972 svchost.com 85 PID 3064 wrote to memory of 3488 3064 C85F4D~1.EXE 86 PID 3064 wrote to memory of 3488 3064 C85F4D~1.EXE 86 PID 3064 wrote to memory of 3488 3064 C85F4D~1.EXE 86 PID 3488 wrote to memory of 5012 3488 svchost.com 87 PID 3488 wrote to memory of 5012 3488 svchost.com 87 PID 3488 wrote to memory of 5012 3488 svchost.com 87 PID 5012 wrote to memory of 3988 5012 C85F4D~1.EXE 112 PID 5012 wrote to memory of 3988 5012 C85F4D~1.EXE 112 PID 5012 wrote to memory of 3988 5012 C85F4D~1.EXE 112 PID 3988 wrote to memory of 4428 3988 svchost.com 89 PID 3988 wrote to memory of 4428 3988 svchost.com 89 PID 3988 wrote to memory of 4428 3988 svchost.com 89 PID 4428 wrote to memory of 1092 4428 C85F4D~1.EXE 90 PID 4428 wrote to memory of 1092 4428 C85F4D~1.EXE 90 PID 4428 wrote to memory of 1092 4428 C85F4D~1.EXE 90 PID 1092 wrote to memory of 1256 1092 svchost.com 91 PID 1092 wrote to memory of 1256 1092 svchost.com 91 PID 1092 wrote to memory of 1256 1092 svchost.com 91 PID 1256 wrote to memory of 3720 1256 C85F4D~1.EXE 92 PID 1256 wrote to memory of 3720 1256 C85F4D~1.EXE 92 PID 1256 wrote to memory of 3720 1256 C85F4D~1.EXE 92 PID 3720 wrote to memory of 1248 3720 svchost.com 93 PID 3720 wrote to memory of 1248 3720 svchost.com 93 PID 3720 wrote to memory of 1248 3720 svchost.com 93 PID 1248 wrote to memory of 3464 1248 C85F4D~1.EXE 202 PID 1248 wrote to memory of 3464 1248 C85F4D~1.EXE 202 PID 1248 wrote to memory of 3464 1248 C85F4D~1.EXE 202 PID 3464 wrote to memory of 4644 3464 svchost.com 203 PID 3464 wrote to memory of 4644 3464 svchost.com 203 PID 3464 wrote to memory of 4644 3464 svchost.com 203 PID 4644 wrote to memory of 1392 4644 C85F4D~1.EXE 210 PID 4644 wrote to memory of 1392 4644 C85F4D~1.EXE 210 PID 4644 wrote to memory of 1392 4644 C85F4D~1.EXE 210 PID 1392 wrote to memory of 2364 1392 svchost.com 97 PID 1392 wrote to memory of 2364 1392 svchost.com 97 PID 1392 wrote to memory of 2364 1392 svchost.com 97 PID 2364 wrote to memory of 2556 2364 C85F4D~1.EXE 98 PID 2364 wrote to memory of 2556 2364 C85F4D~1.EXE 98 PID 2364 wrote to memory of 2556 2364 C85F4D~1.EXE 98 PID 2556 wrote to memory of 2524 2556 svchost.com 99 PID 2556 wrote to memory of 2524 2556 svchost.com 99 PID 2556 wrote to memory of 2524 2556 svchost.com 99 PID 2524 wrote to memory of 4000 2524 C85F4D~1.EXE 129 PID 2524 wrote to memory of 4000 2524 C85F4D~1.EXE 129 PID 2524 wrote to memory of 4000 2524 C85F4D~1.EXE 129 PID 4000 wrote to memory of 1368 4000 svchost.com 218 PID 4000 wrote to memory of 1368 4000 svchost.com 218 PID 4000 wrote to memory of 1368 4000 svchost.com 218 PID 1368 wrote to memory of 3580 1368 C85F4D~1.EXE 102 PID 1368 wrote to memory of 3580 1368 C85F4D~1.EXE 102 PID 1368 wrote to memory of 3580 1368 C85F4D~1.EXE 102 PID 3580 wrote to memory of 4868 3580 svchost.com 103 PID 3580 wrote to memory of 4868 3580 svchost.com 103 PID 3580 wrote to memory of 4868 3580 svchost.com 103 PID 4868 wrote to memory of 4684 4868 C85F4D~1.EXE 260
Processes
-
C:\Users\Admin\AppData\Local\Temp\c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe"C:\Users\Admin\AppData\Local\Temp\c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\c85f4d9fcefa90aabdfae96303a975b3a19f360340db04bf0ef4f02dba2d8480N.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"23⤵
- Executes dropped EXE
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"25⤵
- Executes dropped EXE
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE26⤵
- Executes dropped EXE
- Modifies registry class
PID:2708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"27⤵
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
PID:4804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"29⤵
- Executes dropped EXE
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE30⤵
- Executes dropped EXE
- Modifies registry class
PID:5108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE32⤵
- Executes dropped EXE
PID:4836 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"33⤵
- Executes dropped EXE
PID:492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"35⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"37⤵
- Executes dropped EXE
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE38⤵
- Executes dropped EXE
PID:5100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"39⤵
- Executes dropped EXE
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE40⤵
- Executes dropped EXE
PID:1936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"43⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
PID:4652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"45⤵
- Executes dropped EXE
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"47⤵
- Executes dropped EXE
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE48⤵
- Executes dropped EXE
PID:4000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"49⤵
- Executes dropped EXE
PID:4032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE50⤵
- Executes dropped EXE
PID:5060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"51⤵
- Executes dropped EXE
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"53⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE54⤵
- Executes dropped EXE
PID:4196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"55⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"57⤵
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"59⤵
- Executes dropped EXE
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"61⤵
- Executes dropped EXE
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE62⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3244 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"65⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE66⤵
- Modifies registry class
PID:3488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"67⤵PID:4804
-
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE68⤵PID:3012
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"69⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE70⤵PID:2092
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"71⤵
- Drops file in Windows directory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE72⤵
- System Location Discovery: System Language Discovery
PID:3624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"73⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE74⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"75⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE76⤵
- Checks computer location settings
- Modifies registry class
PID:2772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"77⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE78⤵PID:3016
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"79⤵
- System Location Discovery: System Language Discovery
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE80⤵
- Checks computer location settings
PID:208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"81⤵
- System Location Discovery: System Language Discovery
PID:4412 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE82⤵
- Checks computer location settings
- Modifies registry class
PID:3876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE84⤵
- Checks computer location settings
PID:2864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"85⤵PID:4768
-
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE86⤵
- System Location Discovery: System Language Discovery
PID:1884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"87⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE88⤵
- Checks computer location settings
PID:3448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"89⤵
- System Location Discovery: System Language Discovery
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE90⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"91⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE92⤵PID:1296
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"93⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE94⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"95⤵
- System Location Discovery: System Language Discovery
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE96⤵
- Drops file in Windows directory
- Modifies registry class
PID:3296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"97⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE98⤵
- Modifies registry class
PID:1568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE100⤵PID:4696
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"101⤵PID:3460
-
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE102⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4376 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"103⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE104⤵
- Checks computer location settings
- Modifies registry class
PID:4772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"105⤵PID:3472
-
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE106⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:396 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"107⤵
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE108⤵PID:4260
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"109⤵PID:3224
-
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE110⤵
- Checks computer location settings
PID:2032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"111⤵
- Drops file in Windows directory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE112⤵
- Checks computer location settings
PID:4004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"113⤵PID:1664
-
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE114⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4628 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"115⤵PID:1224
-
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE116⤵
- System Location Discovery: System Language Discovery
PID:3512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"117⤵
- Drops file in Windows directory
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE118⤵
- Checks computer location settings
PID:2568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"119⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE120⤵
- Modifies registry class
PID:3464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE"121⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\C85F4D~1.EXE122⤵
- Modifies registry class
PID:4872
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-