Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-01-2025 21:14
Static task
static1
Behavioral task
behavioral1
Sample
258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe
Resource
win10v2004-20241007-en
General
-
Target
258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe
-
Size
257KB
-
MD5
a21a10aa6027254a8d1e38e060215ac3
-
SHA1
58af229abb8ec4fbed29c012f07d4b56e7409433
-
SHA256
258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b
-
SHA512
65d08842968272d2c0c1f01fbd1d6dcb05b6213fc597439a76831b02c2dae2e41a5bc23cf46a0fb918cf5c279a9f4bec0ad0f036f6e9bce3ac5f256bb0907f07
-
SSDEEP
6144:jyH7xOc6H5c6HcT66vlmrEbAMpgY3gTH8DRBUeRUqptyH7xOc6H5c6HcT66vlmrM:ja6+Me7ale0
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000a000000023b7c-8.dat family_neshta behavioral2/files/0x000a000000023b7f-25.dat family_neshta behavioral2/files/0x000a000000023b80-32.dat family_neshta behavioral2/memory/1412-38-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2460-49-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3648-50-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1920-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4800-62-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/400-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4256-74-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2632-85-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2108-86-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4424-96-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4884-98-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4176-108-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020348-110.dat family_neshta behavioral2/files/0x0006000000020223-118.dat family_neshta behavioral2/files/0x000600000002021b-117.dat family_neshta behavioral2/files/0x0007000000020283-116.dat family_neshta behavioral2/files/0x0006000000020232-136.dat family_neshta behavioral2/files/0x000400000002030e-135.dat family_neshta behavioral2/memory/4644-137-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000020294-134.dat family_neshta behavioral2/files/0x000400000002034d-133.dat family_neshta behavioral2/memory/4060-141-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000202ac-132.dat family_neshta behavioral2/files/0x000400000002033b-131.dat family_neshta behavioral2/files/0x0001000000020299-130.dat family_neshta behavioral2/files/0x000100000002022a-129.dat family_neshta behavioral2/memory/2444-149-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2520-159-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0002000000020312-164.dat family_neshta behavioral2/memory/2424-167-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4848-186-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214e0-180.dat family_neshta behavioral2/files/0x00010000000214df-179.dat family_neshta behavioral2/files/0x00010000000225de-178.dat family_neshta behavioral2/memory/2512-204-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4656-215-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2528-236-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4000-238-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1664-246-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4812-248-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1860-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1496-273-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2292-286-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5032-293-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2968-301-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4420-308-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1952-309-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2372-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3132-317-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4884-324-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2864-325-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4368-327-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/396-333-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1404-340-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1992-341-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4060-343-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3628-349-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/776-351-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3700-357-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3764-364-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4888-365-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation 258DF3~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 3892 svchost.exe 3580 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe 3324 svchost.exe 3748 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe 5116 svchost.exe 4372 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe 1412 svchost.com 2460 258DF3~1.EXE 3648 svchost.com 1920 258DF3~1.EXE 4800 svchost.com 400 258DF3~1.EXE 4256 svchost.com 2632 258DF3~1.EXE 2108 svchost.com 4424 258DF3~1.EXE 4884 svchost.com 4176 258DF3~1.EXE 4644 svchost.com 4060 258DF3~1.EXE 2444 svchost.com 2520 258DF3~1.EXE 2424 svchost.com 4848 258DF3~1.EXE 2512 svchost.com 4656 258DF3~1.EXE 2528 svchost.com 4000 258DF3~1.EXE 1664 svchost.com 4812 258DF3~1.EXE 1860 svchost.com 1496 258DF3~1.EXE 2292 svchost.com 5032 258DF3~1.EXE 2968 svchost.com 4420 258DF3~1.EXE 1952 svchost.com 2372 258DF3~1.EXE 3132 svchost.com 4884 258DF3~1.EXE 2864 svchost.com 4368 258DF3~1.EXE 396 svchost.com 1404 258DF3~1.EXE 1992 svchost.com 4060 258DF3~1.EXE 3628 svchost.com 776 258DF3~1.EXE 3700 svchost.com 3764 258DF3~1.EXE 4888 svchost.com 3760 258DF3~1.EXE 628 svchost.com 2420 258DF3~1.EXE 1112 svchost.com 3336 258DF3~1.EXE 2512 svchost.com 4028 258DF3~1.EXE 4904 svchost.com 4352 258DF3~1.EXE 3280 svchost.com 1380 258DF3~1.EXE 2956 svchost.com 968 258DF3~1.EXE -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jrunscript.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe svchost.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\directx.sys 258DF3~1.EXE File opened for modification C:\Windows\directx.sys 258DF3~1.EXE File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 258DF3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 258DF3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\directx.sys 258DF3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 258DF3~1.EXE File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 258DF3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\directx.sys 258DF3~1.EXE File opened for modification C:\Windows\directx.sys 258DF3~1.EXE File opened for modification C:\Windows\directx.sys 258DF3~1.EXE File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 258DF3~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 258DF3~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE Key created \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000_Classes\Local Settings 258DF3~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4000 wrote to memory of 3892 4000 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe 82 PID 4000 wrote to memory of 3892 4000 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe 82 PID 4000 wrote to memory of 3892 4000 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe 82 PID 3892 wrote to memory of 3580 3892 svchost.exe 83 PID 3892 wrote to memory of 3580 3892 svchost.exe 83 PID 3892 wrote to memory of 3580 3892 svchost.exe 83 PID 3580 wrote to memory of 3748 3580 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe 85 PID 3580 wrote to memory of 3748 3580 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe 85 PID 3580 wrote to memory of 3748 3580 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe 85 PID 3748 wrote to memory of 5116 3748 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe 86 PID 3748 wrote to memory of 5116 3748 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe 86 PID 3748 wrote to memory of 5116 3748 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe 86 PID 5116 wrote to memory of 4372 5116 svchost.exe 87 PID 5116 wrote to memory of 4372 5116 svchost.exe 87 PID 5116 wrote to memory of 4372 5116 svchost.exe 87 PID 4372 wrote to memory of 1412 4372 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe 88 PID 4372 wrote to memory of 1412 4372 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe 88 PID 4372 wrote to memory of 1412 4372 258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe 88 PID 1412 wrote to memory of 2460 1412 svchost.com 89 PID 1412 wrote to memory of 2460 1412 svchost.com 89 PID 1412 wrote to memory of 2460 1412 svchost.com 89 PID 2460 wrote to memory of 3648 2460 258DF3~1.EXE 90 PID 2460 wrote to memory of 3648 2460 258DF3~1.EXE 90 PID 2460 wrote to memory of 3648 2460 258DF3~1.EXE 90 PID 3648 wrote to memory of 1920 3648 svchost.com 91 PID 3648 wrote to memory of 1920 3648 svchost.com 91 PID 3648 wrote to memory of 1920 3648 svchost.com 91 PID 1920 wrote to memory of 4800 1920 258DF3~1.EXE 92 PID 1920 wrote to memory of 4800 1920 258DF3~1.EXE 92 PID 1920 wrote to memory of 4800 1920 258DF3~1.EXE 92 PID 4800 wrote to memory of 400 4800 svchost.com 93 PID 4800 wrote to memory of 400 4800 svchost.com 93 PID 4800 wrote to memory of 400 4800 svchost.com 93 PID 400 wrote to memory of 4256 400 258DF3~1.EXE 94 PID 400 wrote to memory of 4256 400 258DF3~1.EXE 94 PID 400 wrote to memory of 4256 400 258DF3~1.EXE 94 PID 4256 wrote to memory of 2632 4256 svchost.com 95 PID 4256 wrote to memory of 2632 4256 svchost.com 95 PID 4256 wrote to memory of 2632 4256 svchost.com 95 PID 2632 wrote to memory of 2108 2632 258DF3~1.EXE 96 PID 2632 wrote to memory of 2108 2632 258DF3~1.EXE 96 PID 2632 wrote to memory of 2108 2632 258DF3~1.EXE 96 PID 2108 wrote to memory of 4424 2108 svchost.com 97 PID 2108 wrote to memory of 4424 2108 svchost.com 97 PID 2108 wrote to memory of 4424 2108 svchost.com 97 PID 4424 wrote to memory of 4884 4424 258DF3~1.EXE 121 PID 4424 wrote to memory of 4884 4424 258DF3~1.EXE 121 PID 4424 wrote to memory of 4884 4424 258DF3~1.EXE 121 PID 4884 wrote to memory of 4176 4884 svchost.com 99 PID 4884 wrote to memory of 4176 4884 svchost.com 99 PID 4884 wrote to memory of 4176 4884 svchost.com 99 PID 4176 wrote to memory of 4644 4176 258DF3~1.EXE 165 PID 4176 wrote to memory of 4644 4176 258DF3~1.EXE 165 PID 4176 wrote to memory of 4644 4176 258DF3~1.EXE 165 PID 4644 wrote to memory of 4060 4644 svchost.com 127 PID 4644 wrote to memory of 4060 4644 svchost.com 127 PID 4644 wrote to memory of 4060 4644 svchost.com 127 PID 4060 wrote to memory of 2444 4060 258DF3~1.EXE 102 PID 4060 wrote to memory of 2444 4060 258DF3~1.EXE 102 PID 4060 wrote to memory of 2444 4060 258DF3~1.EXE 102 PID 2444 wrote to memory of 2520 2444 svchost.com 103 PID 2444 wrote to memory of 2520 2444 svchost.com 103 PID 2444 wrote to memory of 2520 2444 svchost.com 103 PID 2520 wrote to memory of 2424 2520 258DF3~1.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe"C:\Users\Admin\AppData\Local\Temp\258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3892 -
C:\Users\Admin\AppData\Local\Temp\258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe"C:\Users\Admin\AppData\Local\Temp\258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\258df3371764b8ecb73ff5d97ed381afd47e58cf6fc4db48641062a29feed65b.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4256 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE14⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"17⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE20⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"21⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"23⤵
- Executes dropped EXE
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE24⤵
- Executes dropped EXE
PID:4848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"25⤵
- Executes dropped EXE
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
PID:4656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE28⤵
- Executes dropped EXE
- Modifies registry class
PID:4000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE30⤵
- Executes dropped EXE
- Modifies registry class
PID:4812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"31⤵
- Executes dropped EXE
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
PID:1496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"33⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"35⤵
- Executes dropped EXE
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE36⤵
- Executes dropped EXE
PID:4420 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"37⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE38⤵
- Executes dropped EXE
PID:2372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"39⤵
- Executes dropped EXE
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"43⤵
- Executes dropped EXE
PID:396 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
PID:1404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"49⤵
- Executes dropped EXE
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"51⤵
- Executes dropped EXE
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"53⤵
- Executes dropped EXE
PID:628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE54⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2420 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"55⤵
- Executes dropped EXE
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"57⤵
- Executes dropped EXE
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"59⤵
- Executes dropped EXE
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE60⤵
- Executes dropped EXE
PID:4352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"63⤵
- Executes dropped EXE
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE64⤵
- Executes dropped EXE
PID:968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"65⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE66⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE68⤵PID:1132
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"69⤵PID:4184
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE70⤵
- Checks computer location settings
PID:4800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"71⤵PID:316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE72⤵
- Checks computer location settings
- Modifies registry class
PID:632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"73⤵PID:3888
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE74⤵
- Modifies registry class
PID:4500 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"75⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE76⤵
- Checks computer location settings
- Modifies registry class
PID:3252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"77⤵
- Drops file in Windows directory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE78⤵PID:4752
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"79⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE80⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"81⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE82⤵
- Modifies registry class
PID:1268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE84⤵PID:4644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"85⤵PID:3616
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE86⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"87⤵
- Drops file in Windows directory
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE88⤵PID:2468
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"89⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE90⤵PID:2008
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"91⤵
- Drops file in Windows directory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE92⤵PID:2016
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"93⤵PID:4068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE94⤵
- Checks computer location settings
PID:2064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"95⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE96⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"97⤵
- System Location Discovery: System Language Discovery
PID:348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE98⤵
- Modifies registry class
PID:5052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"99⤵
- Drops file in Windows directory
PID:5100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE100⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"101⤵PID:4692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE102⤵
- Checks computer location settings
- Modifies registry class
PID:4352 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"103⤵
- System Location Discovery: System Language Discovery
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE104⤵
- Checks computer location settings
PID:2448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"105⤵PID:3564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE106⤵
- Modifies registry class
PID:1412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"107⤵PID:2924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE108⤵
- Modifies registry class
PID:4564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"109⤵
- Drops file in Windows directory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE110⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:4548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"111⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE112⤵
- Checks computer location settings
PID:3016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"113⤵PID:4632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE114⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:4184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"115⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE116⤵PID:1360
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"117⤵PID:4784
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE118⤵PID:4928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"119⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE120⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE"121⤵
- Drops file in Windows directory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\258DF3~1.EXE122⤵
- Checks computer location settings
PID:924
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-