Analysis
-
max time kernel
41s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2025 23:28
Behavioral task
behavioral1
Sample
1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe
Resource
win10v2004-20241007-en
General
-
Target
1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe
-
Size
482KB
-
MD5
eb0b24dc17d606db50357792ba08a3f0
-
SHA1
d4db8ccf2366462de37047e871fede7ac3973c69
-
SHA256
1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073ca
-
SHA512
035373f13628dda81d517b913c25ee13f6a02d5276c18c8d28ca337decfbce2dfcf522961758f05d1790d3f6c1bd46ae0768e79a4abd976e0ff0f5ffe873a903
-
SSDEEP
3072:sr85CCQ2z1yr5JShnr85Cxr85Cxr85Cxr85Cxr85Cxr85Cxr85Cxr85Cxr85Cxr9:k9CQvAr9N9N9N9N9N9N9N9N9N9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0008000000023c8f-4.dat family_neshta behavioral2/files/0x0007000000023c94-11.dat family_neshta behavioral2/memory/5060-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3340-26-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/840-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3288-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1548-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2552-51-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1688-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3928-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2004-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/640-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4040-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4020-80-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002035c-89.dat family_neshta behavioral2/files/0x0007000000020297-91.dat family_neshta behavioral2/files/0x000600000002022b-97.dat family_neshta behavioral2/files/0x000400000002034f-104.dat family_neshta behavioral2/files/0x0006000000020246-112.dat family_neshta behavioral2/memory/3608-113-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5012-123-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3236-125-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1292-136-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020322-111.dat family_neshta behavioral2/memory/4552-137-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000202a8-110.dat family_neshta behavioral2/files/0x00010000000202ad-103.dat family_neshta behavioral2/files/0x000100000002023e-102.dat family_neshta behavioral2/memory/5056-148-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3280-149-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000600000002024e-164.dat family_neshta behavioral2/files/0x0001000000021542-167.dat family_neshta behavioral2/files/0x0001000000022f40-187.dat family_neshta behavioral2/memory/4860-211-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4868-225-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3736-189-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f3f-182.dat family_neshta behavioral2/files/0x0001000000022f3e-181.dat family_neshta behavioral2/memory/772-234-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1456-176-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214ed-175.dat family_neshta behavioral2/files/0x00010000000214ec-174.dat family_neshta behavioral2/files/0x00010000000214eb-173.dat family_neshta behavioral2/files/0x0002000000020326-166.dat family_neshta behavioral2/files/0x0008000000020250-165.dat family_neshta behavioral2/memory/3040-240-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2852-252-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4468-256-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3520-261-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2592-267-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4416-274-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4200-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2108-281-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4944-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2392-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2408-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/212-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2160-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3304-305-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3240-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/60-313-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2008-319-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1784-321-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2472-327-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 1BD926~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 3012 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe 5060 svchost.com 3340 1BD926~1.EXE 840 svchost.com 3288 1BD926~1.EXE 1548 svchost.com 2552 1BD926~1.EXE 1688 svchost.com 3928 1BD926~1.EXE 2004 svchost.com 640 1BD926~1.EXE 4040 svchost.com 4020 1BD926~1.EXE 3608 svchost.com 5012 1BD926~1.EXE 3236 svchost.com 1292 1BD926~1.EXE 4552 svchost.com 5056 1BD926~1.EXE 3280 svchost.com 1456 1BD926~1.EXE 3736 svchost.com 4860 1BD926~1.EXE 4868 svchost.com 772 1BD926~1.EXE 3040 svchost.com 2852 1BD926~1.EXE 4468 svchost.com 3520 1BD926~1.EXE 2592 svchost.com 4416 1BD926~1.EXE 4200 svchost.com 2108 1BD926~1.EXE 4944 svchost.com 2392 1BD926~1.EXE 2408 svchost.com 212 1BD926~1.EXE 2160 svchost.com 3304 1BD926~1.EXE 3240 svchost.com 60 1BD926~1.EXE 2008 svchost.com 1784 1BD926~1.EXE 2472 svchost.com 2368 1BD926~1.EXE 2200 svchost.com 4792 1BD926~1.EXE 3124 svchost.com 4552 1BD926~1.EXE 4404 svchost.com 3584 1BD926~1.EXE 1656 svchost.com 2116 1BD926~1.EXE 220 svchost.com 2080 1BD926~1.EXE 4732 svchost.com 2288 1BD926~1.EXE 4036 svchost.com 4760 1BD926~1.EXE 4656 svchost.com 1812 1BD926~1.EXE 964 svchost.com 3456 1BD926~1.EXE 4596 svchost.com -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 1BD926~1.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 1BD926~1.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 1BD926~1.EXE File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 1BD926~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 1BD926~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 1BD926~1.EXE File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 1BD926~1.EXE File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 1BD926~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 1BD926~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys 1BD926~1.EXE File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 1BD926~1.EXE File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\directx.sys 1BD926~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\directx.sys 1BD926~1.EXE File opened for modification C:\Windows\directx.sys 1BD926~1.EXE File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\directx.sys 1BD926~1.EXE File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\directx.sys 1BD926~1.EXE File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 1BD926~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 1BD926~1.EXE File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 1BD926~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 1BD926~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 1BD926~1.EXE File opened for modification C:\Windows\directx.sys 1BD926~1.EXE File opened for modification C:\Windows\directx.sys 1BD926~1.EXE File opened for modification C:\Windows\directx.sys 1BD926~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 1BD926~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BD926~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 1BD926~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2156 wrote to memory of 3012 2156 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe 82 PID 2156 wrote to memory of 3012 2156 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe 82 PID 2156 wrote to memory of 3012 2156 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe 82 PID 3012 wrote to memory of 5060 3012 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe 83 PID 3012 wrote to memory of 5060 3012 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe 83 PID 3012 wrote to memory of 5060 3012 1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe 83 PID 5060 wrote to memory of 3340 5060 svchost.com 84 PID 5060 wrote to memory of 3340 5060 svchost.com 84 PID 5060 wrote to memory of 3340 5060 svchost.com 84 PID 3340 wrote to memory of 840 3340 1BD926~1.EXE 85 PID 3340 wrote to memory of 840 3340 1BD926~1.EXE 85 PID 3340 wrote to memory of 840 3340 1BD926~1.EXE 85 PID 840 wrote to memory of 3288 840 svchost.com 86 PID 840 wrote to memory of 3288 840 svchost.com 86 PID 840 wrote to memory of 3288 840 svchost.com 86 PID 3288 wrote to memory of 1548 3288 1BD926~1.EXE 87 PID 3288 wrote to memory of 1548 3288 1BD926~1.EXE 87 PID 3288 wrote to memory of 1548 3288 1BD926~1.EXE 87 PID 1548 wrote to memory of 2552 1548 svchost.com 88 PID 1548 wrote to memory of 2552 1548 svchost.com 88 PID 1548 wrote to memory of 2552 1548 svchost.com 88 PID 2552 wrote to memory of 1688 2552 1BD926~1.EXE 89 PID 2552 wrote to memory of 1688 2552 1BD926~1.EXE 89 PID 2552 wrote to memory of 1688 2552 1BD926~1.EXE 89 PID 1688 wrote to memory of 3928 1688 svchost.com 90 PID 1688 wrote to memory of 3928 1688 svchost.com 90 PID 1688 wrote to memory of 3928 1688 svchost.com 90 PID 3928 wrote to memory of 2004 3928 1BD926~1.EXE 91 PID 3928 wrote to memory of 2004 3928 1BD926~1.EXE 91 PID 3928 wrote to memory of 2004 3928 1BD926~1.EXE 91 PID 2004 wrote to memory of 640 2004 svchost.com 92 PID 2004 wrote to memory of 640 2004 svchost.com 92 PID 2004 wrote to memory of 640 2004 svchost.com 92 PID 640 wrote to memory of 4040 640 1BD926~1.EXE 159 PID 640 wrote to memory of 4040 640 1BD926~1.EXE 159 PID 640 wrote to memory of 4040 640 1BD926~1.EXE 159 PID 4040 wrote to memory of 4020 4040 svchost.com 94 PID 4040 wrote to memory of 4020 4040 svchost.com 94 PID 4040 wrote to memory of 4020 4040 svchost.com 94 PID 4020 wrote to memory of 3608 4020 1BD926~1.EXE 163 PID 4020 wrote to memory of 3608 4020 1BD926~1.EXE 163 PID 4020 wrote to memory of 3608 4020 1BD926~1.EXE 163 PID 3608 wrote to memory of 5012 3608 svchost.com 96 PID 3608 wrote to memory of 5012 3608 svchost.com 96 PID 3608 wrote to memory of 5012 3608 svchost.com 96 PID 5012 wrote to memory of 3236 5012 1BD926~1.EXE 97 PID 5012 wrote to memory of 3236 5012 1BD926~1.EXE 97 PID 5012 wrote to memory of 3236 5012 1BD926~1.EXE 97 PID 3236 wrote to memory of 1292 3236 svchost.com 207 PID 3236 wrote to memory of 1292 3236 svchost.com 207 PID 3236 wrote to memory of 1292 3236 svchost.com 207 PID 1292 wrote to memory of 4552 1292 1BD926~1.EXE 131 PID 1292 wrote to memory of 4552 1292 1BD926~1.EXE 131 PID 1292 wrote to memory of 4552 1292 1BD926~1.EXE 131 PID 4552 wrote to memory of 5056 4552 svchost.com 100 PID 4552 wrote to memory of 5056 4552 svchost.com 100 PID 4552 wrote to memory of 5056 4552 svchost.com 100 PID 5056 wrote to memory of 3280 5056 1BD926~1.EXE 101 PID 5056 wrote to memory of 3280 5056 1BD926~1.EXE 101 PID 5056 wrote to memory of 3280 5056 1BD926~1.EXE 101 PID 3280 wrote to memory of 1456 3280 svchost.com 102 PID 3280 wrote to memory of 1456 3280 svchost.com 102 PID 3280 wrote to memory of 1456 3280 svchost.com 102 PID 1456 wrote to memory of 3736 1456 1BD926~1.EXE 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe"C:\Users\Admin\AppData\Local\Temp\1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\1bd926c75e799d112871c977da1a87e5590d71deda49960036c61652133073caN.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"11⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"17⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE18⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"23⤵
- Executes dropped EXE
PID:3736 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
PID:4860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"25⤵
- Executes dropped EXE
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
PID:2852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"29⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE32⤵
- Executes dropped EXE
PID:4416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"33⤵
- Executes dropped EXE
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"35⤵
- Executes dropped EXE
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE36⤵
- Executes dropped EXE
PID:2392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"37⤵
- Executes dropped EXE
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE38⤵
- Executes dropped EXE
PID:212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"39⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE40⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"41⤵
- Executes dropped EXE
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE42⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:60 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1784 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE46⤵
- Executes dropped EXE
PID:2368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE48⤵
- Executes dropped EXE
- Modifies registry class
PID:4792 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"51⤵
- Executes dropped EXE
PID:4404 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"53⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE54⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"55⤵
- Executes dropped EXE
PID:220 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE56⤵
- Executes dropped EXE
PID:2080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"57⤵
- Executes dropped EXE
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE58⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE60⤵
- Executes dropped EXE
PID:4760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE62⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"63⤵
- Executes dropped EXE
PID:964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE66⤵
- Checks computer location settings
PID:3760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"67⤵PID:3492
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE68⤵
- Modifies registry class
PID:4084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"69⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE70⤵PID:4140
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"71⤵
- System Location Discovery: System Language Discovery
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE72⤵
- Checks computer location settings
PID:1884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"73⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE74⤵
- Modifies registry class
PID:3720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"75⤵
- Drops file in Windows directory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE76⤵PID:2520
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"77⤵PID:100
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE78⤵
- Drops file in Windows directory
PID:4040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"79⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE80⤵
- Checks computer location settings
- Modifies registry class
PID:2728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"81⤵PID:916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE82⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"83⤵
- Drops file in Windows directory
PID:4016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE84⤵
- Checks computer location settings
- Modifies registry class
PID:264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"85⤵
- System Location Discovery: System Language Discovery
PID:3480 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE86⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:3892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"87⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE88⤵
- Modifies registry class
PID:1144 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"89⤵PID:4100
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE90⤵
- Checks computer location settings
- Modifies registry class
PID:184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"91⤵PID:3672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE92⤵PID:4120
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"93⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE94⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"95⤵
- System Location Discovery: System Language Discovery
PID:3744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE96⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"97⤵PID:4888
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE98⤵
- Modifies registry class
PID:364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"99⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE100⤵
- Modifies registry class
PID:4756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"101⤵PID:3940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE102⤵
- Modifies registry class
PID:844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"103⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE104⤵PID:4048
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"105⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE106⤵
- Modifies registry class
PID:4768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"107⤵
- Drops file in Windows directory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE108⤵PID:4008
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"109⤵PID:4640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE110⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"111⤵PID:3996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE112⤵
- System Location Discovery: System Language Discovery
PID:452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"113⤵
- System Location Discovery: System Language Discovery
PID:4092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE114⤵
- Checks computer location settings
PID:2160 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"115⤵
- System Location Discovery: System Language Discovery
PID:212 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE116⤵
- Checks computer location settings
PID:4180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE118⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
PID:1460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"119⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE120⤵PID:4228
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE"121⤵PID:4676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\1BD926~1.EXE122⤵
- Modifies registry class
PID:2472
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-