Analysis
-
max time kernel
141s -
max time network
133s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 06:58
Behavioral task
behavioral1
Sample
ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe
Resource
win10v2004-20241007-en
General
-
Target
ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe
-
Size
218KB
-
MD5
f1f1d0ad99a6e3e4d66b45cf74aa64b9
-
SHA1
b4b7752d04880c9d176ab25339c6b4ccd5a5cf09
-
SHA256
ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778
-
SHA512
6f50c1ab8a992e4859e917abf00c29a9fa2f118a59ed8d654c198ea7e7ac0163f3c908dc7963e48d914f566820413a2e9a258092bfa05b15af8f5df5e6edc458
-
SSDEEP
6144:k90ICFBj7tf/k+AbAyUeRUqttyH7xOc6H5c6HcT66vlmrL:ZBj7hybABevai
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0008000000023c83-17.dat family_neshta behavioral2/files/0x0007000000023c88-23.dat family_neshta behavioral2/memory/3672-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3456-41-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3696-42-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1396-53-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4064-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4056-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2756-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2480-70-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2952-78-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2544-82-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020368-91.dat family_neshta behavioral2/files/0x000100000002024a-99.dat family_neshta behavioral2/memory/3756-96-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4896-114-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4976-123-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1524-134-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000800000002025a-138.dat family_neshta behavioral2/files/0x0006000000020258-137.dat family_neshta behavioral2/files/0x00010000000214ff-143.dat family_neshta behavioral2/memory/1720-154-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4476-173-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f94-161.dat family_neshta behavioral2/files/0x0001000000022f52-160.dat family_neshta behavioral2/files/0x0001000000022f56-159.dat family_neshta behavioral2/files/0x0001000000021501-150.dat family_neshta behavioral2/files/0x0001000000021500-148.dat family_neshta behavioral2/files/0x0001000000022f95-178.dat family_neshta behavioral2/memory/3728-180-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167d3-189.dat family_neshta behavioral2/files/0x00010000000167d1-190.dat family_neshta behavioral2/memory/3140-193-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167f2-208.dat family_neshta behavioral2/files/0x00010000000167d5-202.dat family_neshta behavioral2/files/0x00010000000167b8-188.dat family_neshta behavioral2/files/0x000100000001680a-187.dat family_neshta behavioral2/memory/1092-241-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3276-248-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5072-254-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1188-256-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3380-262-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4312-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/532-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4688-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1296-285-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3340-292-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3884-293-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2120-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2416-301-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3048-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/840-309-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4140-316-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1552-317-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1824-324-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1724-325-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3120-327-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1784-333-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2568-335-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4972-341-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4864-343-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1012-349-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3636-351-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1676-357-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation DDF12A~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 3920 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 3380 svchost.exe 1060 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 1908 svchost.exe 3672 svchost.com 3456 DDF12A~1.EXE 3696 svchost.com 1396 DDF12A~1.EXE 4064 svchost.com 4056 DDF12A~1.EXE 2756 svchost.com 2480 DDF12A~1.EXE 2952 svchost.com 2544 DDF12A~1.EXE 3756 svchost.com 4896 DDF12A~1.EXE 4976 svchost.com 1524 DDF12A~1.EXE 1720 svchost.com 4476 DDF12A~1.EXE 3728 svchost.com 3140 DDF12A~1.EXE 1092 svchost.com 3276 DDF12A~1.EXE 5072 svchost.com 1188 DDF12A~1.EXE 3380 svchost.com 4312 DDF12A~1.EXE 532 svchost.com 4688 DDF12A~1.EXE 1296 svchost.com 3340 DDF12A~1.EXE 3884 svchost.com 2120 DDF12A~1.EXE 2416 svchost.com 3048 DDF12A~1.EXE 840 svchost.com 4140 DDF12A~1.EXE 1552 svchost.com 1824 DDF12A~1.EXE 1724 svchost.com 3120 DDF12A~1.EXE 1784 svchost.com 2568 DDF12A~1.EXE 4972 svchost.com 4864 DDF12A~1.EXE 1012 svchost.com 3636 DDF12A~1.EXE 1676 svchost.com 684 DDF12A~1.EXE 968 svchost.com 4940 DDF12A~1.EXE 4260 svchost.com 740 DDF12A~1.EXE 2356 svchost.com 768 DDF12A~1.EXE 536 svchost.com 696 DDF12A~1.EXE 3496 svchost.com 4228 DDF12A~1.EXE 724 svchost.com 4772 DDF12A~1.EXE 3056 svchost.com 3700 DDF12A~1.EXE -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe svchost.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe svchost.exe File opened for modification C:\Program Files\dotnet\dotnet.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\notification_helper.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com DDF12A~1.EXE File opened for modification C:\Windows\directx.sys DDF12A~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DDF12A~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings DDF12A~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2020 wrote to memory of 3920 2020 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 82 PID 2020 wrote to memory of 3920 2020 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 82 PID 2020 wrote to memory of 3920 2020 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 82 PID 3920 wrote to memory of 3380 3920 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 83 PID 3920 wrote to memory of 3380 3920 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 83 PID 3920 wrote to memory of 3380 3920 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 83 PID 3380 wrote to memory of 1060 3380 svchost.exe 84 PID 3380 wrote to memory of 1060 3380 svchost.exe 84 PID 3380 wrote to memory of 1060 3380 svchost.exe 84 PID 1060 wrote to memory of 3672 1060 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 86 PID 1060 wrote to memory of 3672 1060 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 86 PID 1060 wrote to memory of 3672 1060 ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe 86 PID 3672 wrote to memory of 3456 3672 svchost.com 87 PID 3672 wrote to memory of 3456 3672 svchost.com 87 PID 3672 wrote to memory of 3456 3672 svchost.com 87 PID 3456 wrote to memory of 3696 3456 DDF12A~1.EXE 88 PID 3456 wrote to memory of 3696 3456 DDF12A~1.EXE 88 PID 3456 wrote to memory of 3696 3456 DDF12A~1.EXE 88 PID 3696 wrote to memory of 1396 3696 svchost.com 89 PID 3696 wrote to memory of 1396 3696 svchost.com 89 PID 3696 wrote to memory of 1396 3696 svchost.com 89 PID 1396 wrote to memory of 4064 1396 DDF12A~1.EXE 90 PID 1396 wrote to memory of 4064 1396 DDF12A~1.EXE 90 PID 1396 wrote to memory of 4064 1396 DDF12A~1.EXE 90 PID 4064 wrote to memory of 4056 4064 svchost.com 91 PID 4064 wrote to memory of 4056 4064 svchost.com 91 PID 4064 wrote to memory of 4056 4064 svchost.com 91 PID 4056 wrote to memory of 2756 4056 DDF12A~1.EXE 92 PID 4056 wrote to memory of 2756 4056 DDF12A~1.EXE 92 PID 4056 wrote to memory of 2756 4056 DDF12A~1.EXE 92 PID 2756 wrote to memory of 2480 2756 svchost.com 93 PID 2756 wrote to memory of 2480 2756 svchost.com 93 PID 2756 wrote to memory of 2480 2756 svchost.com 93 PID 2480 wrote to memory of 2952 2480 DDF12A~1.EXE 94 PID 2480 wrote to memory of 2952 2480 DDF12A~1.EXE 94 PID 2480 wrote to memory of 2952 2480 DDF12A~1.EXE 94 PID 2952 wrote to memory of 2544 2952 svchost.com 95 PID 2952 wrote to memory of 2544 2952 svchost.com 95 PID 2952 wrote to memory of 2544 2952 svchost.com 95 PID 2544 wrote to memory of 3756 2544 DDF12A~1.EXE 96 PID 2544 wrote to memory of 3756 2544 DDF12A~1.EXE 96 PID 2544 wrote to memory of 3756 2544 DDF12A~1.EXE 96 PID 3756 wrote to memory of 4896 3756 svchost.com 97 PID 3756 wrote to memory of 4896 3756 svchost.com 97 PID 3756 wrote to memory of 4896 3756 svchost.com 97 PID 4896 wrote to memory of 4976 4896 DDF12A~1.EXE 98 PID 4896 wrote to memory of 4976 4896 DDF12A~1.EXE 98 PID 4896 wrote to memory of 4976 4896 DDF12A~1.EXE 98 PID 4976 wrote to memory of 1524 4976 svchost.com 99 PID 4976 wrote to memory of 1524 4976 svchost.com 99 PID 4976 wrote to memory of 1524 4976 svchost.com 99 PID 1524 wrote to memory of 1720 1524 DDF12A~1.EXE 100 PID 1524 wrote to memory of 1720 1524 DDF12A~1.EXE 100 PID 1524 wrote to memory of 1720 1524 DDF12A~1.EXE 100 PID 1720 wrote to memory of 4476 1720 svchost.com 101 PID 1720 wrote to memory of 4476 1720 svchost.com 101 PID 1720 wrote to memory of 4476 1720 svchost.com 101 PID 4476 wrote to memory of 3728 4476 DDF12A~1.EXE 172 PID 4476 wrote to memory of 3728 4476 DDF12A~1.EXE 172 PID 4476 wrote to memory of 3728 4476 DDF12A~1.EXE 172 PID 3728 wrote to memory of 3140 3728 svchost.com 103 PID 3728 wrote to memory of 3140 3728 svchost.com 103 PID 3728 wrote to memory of 3140 3728 svchost.com 103 PID 3140 wrote to memory of 1092 3140 DDF12A~1.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe"C:\Users\Admin\AppData\Local\Temp\ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3920 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\ddf12a9144022ef98276c6723c0a8d2cf1f1f4820048cf96d9a0275e7cf37778.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"21⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"23⤵
- Executes dropped EXE
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
PID:3276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"25⤵
- Executes dropped EXE
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE26⤵
- Executes dropped EXE
PID:1188 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"27⤵
- Executes dropped EXE
PID:3380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
PID:4312 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"29⤵
- Executes dropped EXE
PID:532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE30⤵
- Executes dropped EXE
- Modifies registry class
PID:4688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"31⤵
- Executes dropped EXE
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE32⤵
- Executes dropped EXE
- Modifies registry class
PID:3340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"33⤵
- Executes dropped EXE
PID:3884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"35⤵
- Executes dropped EXE
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"37⤵
- Executes dropped EXE
PID:840 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
PID:4140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"39⤵
- Executes dropped EXE
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE40⤵
- Executes dropped EXE
- Modifies registry class
PID:1824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"41⤵
- Executes dropped EXE
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"45⤵
- Executes dropped EXE
PID:4972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"47⤵
- Executes dropped EXE
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"49⤵
- Executes dropped EXE
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"51⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"53⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE54⤵
- Executes dropped EXE
- Modifies registry class
PID:740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"55⤵
- Executes dropped EXE
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"57⤵
- Executes dropped EXE
PID:536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE60⤵
- Executes dropped EXE
PID:4228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"61⤵
- Executes dropped EXE
PID:724 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
PID:4772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"63⤵
- Executes dropped EXE
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE64⤵
- Executes dropped EXE
PID:3700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"65⤵PID:4892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE66⤵PID:3456
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"67⤵
- Drops file in Windows directory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE68⤵
- System Location Discovery: System Language Discovery
PID:456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"69⤵PID:4332
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE70⤵PID:1992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"71⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE72⤵
- Checks computer location settings
- Modifies registry class
PID:2180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"73⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE74⤵PID:4624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"75⤵
- Drops file in Windows directory
PID:3840 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE76⤵
- Checks computer location settings
- Modifies registry class
PID:2944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE78⤵
- Modifies registry class
PID:3992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"79⤵PID:3576
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE80⤵PID:1388
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"81⤵PID:464
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE82⤵PID:884
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"83⤵PID:1300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE84⤵PID:1288
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"85⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE86⤵PID:4428
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"87⤵
- System Location Discovery: System Language Discovery
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE88⤵
- Checks computer location settings
PID:1088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"89⤵
- Drops file in Windows directory
PID:936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE90⤵
- Checks computer location settings
- Drops file in Windows directory
PID:1952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"91⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE92⤵
- Checks computer location settings
PID:1440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"93⤵PID:2228
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE94⤵
- Drops file in Windows directory
- Modifies registry class
PID:2476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"95⤵
- Drops file in Windows directory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE96⤵
- Drops file in Windows directory
PID:876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"97⤵
- System Location Discovery: System Language Discovery
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE98⤵
- Checks computer location settings
- Modifies registry class
PID:1292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"99⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE100⤵
- Drops file in Windows directory
PID:1704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"101⤵PID:720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE102⤵
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"103⤵
- Drops file in Windows directory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE104⤵
- Modifies registry class
PID:628 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"105⤵PID:3276
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE106⤵
- Checks computer location settings
PID:4228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"107⤵PID:5008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE108⤵
- Checks computer location settings
PID:1800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"109⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE110⤵PID:544
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"111⤵PID:5116
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE112⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"113⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE114⤵
- Checks computer location settings
PID:1872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"115⤵
- Drops file in Windows directory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE116⤵
- Checks computer location settings
- Modifies registry class
PID:3696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"117⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE118⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:4016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"119⤵
- System Location Discovery: System Language Discovery
PID:3944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE120⤵
- Checks computer location settings
- Modifies registry class
PID:2756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE"121⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\DDF12A~1.EXE122⤵
- Drops file in Windows directory
- Modifies registry class
PID:4392
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-