Analysis
-
max time kernel
38s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 23:23
Behavioral task
behavioral1
Sample
9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe
Resource
win10v2004-20241007-en
General
-
Target
9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe
-
Size
1.0MB
-
MD5
f4c66a81b575670408bf550ebe6f0e30
-
SHA1
49c93276942187c71f0e425abad49a72cc7ea539
-
SHA256
9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7
-
SHA512
acd2c719e2a6871e2fe988b03f16217c56fe32b223f83e0a83d8f93f302a0744ca4e85746c1efe47121513f74d4e0d38de6761085f98552850bb0a6f5e192f42
-
SSDEEP
6144:k9wF9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9N9:
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000a000000023b93-4.dat family_neshta behavioral2/files/0x000a000000023b94-10.dat family_neshta behavioral2/memory/2868-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1600-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4140-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2792-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3984-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/944-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2292-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4296-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3720-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3724-75-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4436-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4540-87-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002035c-89.dat family_neshta behavioral2/memory/2948-91-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002034e-99.dat family_neshta behavioral2/files/0x0006000000020246-124.dat family_neshta behavioral2/files/0x0004000000020322-123.dat family_neshta behavioral2/files/0x00010000000202a8-122.dat family_neshta behavioral2/memory/2256-120-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000202c0-106.dat family_neshta behavioral2/files/0x000400000002034f-105.dat family_neshta behavioral2/files/0x000600000002022b-98.dat family_neshta behavioral2/files/0x000600000002022f-94.dat family_neshta behavioral2/memory/372-126-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2984-130-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1332-145-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214ec-156.dat family_neshta behavioral2/files/0x0001000000022f40-174.dat family_neshta behavioral2/files/0x0001000000022f7d-173.dat family_neshta behavioral2/files/0x0001000000022f3b-172.dat family_neshta behavioral2/files/0x0001000000022f3f-171.dat family_neshta behavioral2/files/0x0001000000022f3e-170.dat family_neshta behavioral2/memory/2732-165-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214eb-155.dat family_neshta behavioral2/files/0x0001000000016853-192.dat family_neshta behavioral2/files/0x00010000000167c7-191.dat family_neshta behavioral2/files/0x00010000000167c9-190.dat family_neshta behavioral2/files/0x00010000000167ae-189.dat family_neshta behavioral2/files/0x0001000000016800-188.dat family_neshta behavioral2/memory/2020-215-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/740-231-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/408-234-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2196-244-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3512-245-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4852-247-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5040-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4136-257-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3156-263-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2292-265-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3276-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4560-273-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3320-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3724-281-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1536-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4104-294-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1716-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2736-302-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/448-304-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2408-305-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/972-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4128-318-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2984-319-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation 9D3C83~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 4948 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe 2868 svchost.com 1600 9D3C83~1.EXE 4140 svchost.com 2792 9D3C83~1.EXE 3984 svchost.com 944 9D3C83~1.EXE 2292 svchost.com 4296 9D3C83~1.EXE 3720 svchost.com 3724 9D3C83~1.EXE 4436 svchost.com 4540 9D3C83~1.EXE 2948 svchost.com 2256 9D3C83~1.EXE 372 svchost.com 2984 9D3C83~1.EXE 1332 svchost.com 2732 9D3C83~1.EXE 2020 svchost.com 740 9D3C83~1.EXE 408 svchost.com 2196 9D3C83~1.EXE 3512 svchost.com 4852 9D3C83~1.EXE 5040 svchost.com 4136 9D3C83~1.EXE 3156 svchost.com 2292 9D3C83~1.EXE 3276 svchost.com 4560 9D3C83~1.EXE 3320 svchost.com 3724 9D3C83~1.EXE 1536 svchost.com 4104 9D3C83~1.EXE 1716 svchost.com 2736 9D3C83~1.EXE 448 svchost.com 2408 9D3C83~1.EXE 972 svchost.com 4128 9D3C83~1.EXE 2984 svchost.com 4872 9D3C83~1.EXE 4216 svchost.com 5112 9D3C83~1.EXE 4616 svchost.com 2876 9D3C83~1.EXE 1008 svchost.com 60 9D3C83~1.EXE 3444 svchost.com 2288 9D3C83~1.EXE 5012 svchost.com 2648 9D3C83~1.EXE 4372 svchost.com 1852 9D3C83~1.EXE 4488 svchost.com 2196 9D3C83~1.EXE 3628 svchost.com 3984 9D3C83~1.EXE 2164 svchost.com 5080 9D3C83~1.EXE 3200 svchost.com 1528 9D3C83~1.EXE 2604 svchost.com -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 9D3C83~1.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 9D3C83~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaws.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 9D3C83~1.EXE File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 9D3C83~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 9D3C83~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 9D3C83~1.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys 9D3C83~1.EXE File opened for modification C:\Windows\directx.sys 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\directx.sys 9D3C83~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\directx.sys 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 9D3C83~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\directx.sys 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\directx.sys 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\directx.sys 9D3C83~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\directx.sys 9D3C83~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\directx.sys 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 9D3C83~1.EXE File opened for modification C:\Windows\svchost.com 9D3C83~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9D3C83~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE Key created \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000_Classes\Local Settings 9D3C83~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4572 wrote to memory of 4948 4572 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe 85 PID 4572 wrote to memory of 4948 4572 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe 85 PID 4572 wrote to memory of 4948 4572 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe 85 PID 4948 wrote to memory of 2868 4948 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe 86 PID 4948 wrote to memory of 2868 4948 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe 86 PID 4948 wrote to memory of 2868 4948 9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe 86 PID 2868 wrote to memory of 1600 2868 svchost.com 87 PID 2868 wrote to memory of 1600 2868 svchost.com 87 PID 2868 wrote to memory of 1600 2868 svchost.com 87 PID 1600 wrote to memory of 4140 1600 9D3C83~1.EXE 88 PID 1600 wrote to memory of 4140 1600 9D3C83~1.EXE 88 PID 1600 wrote to memory of 4140 1600 9D3C83~1.EXE 88 PID 4140 wrote to memory of 2792 4140 svchost.com 89 PID 4140 wrote to memory of 2792 4140 svchost.com 89 PID 4140 wrote to memory of 2792 4140 svchost.com 89 PID 2792 wrote to memory of 3984 2792 9D3C83~1.EXE 143 PID 2792 wrote to memory of 3984 2792 9D3C83~1.EXE 143 PID 2792 wrote to memory of 3984 2792 9D3C83~1.EXE 143 PID 3984 wrote to memory of 944 3984 svchost.com 91 PID 3984 wrote to memory of 944 3984 svchost.com 91 PID 3984 wrote to memory of 944 3984 svchost.com 91 PID 944 wrote to memory of 2292 944 9D3C83~1.EXE 113 PID 944 wrote to memory of 2292 944 9D3C83~1.EXE 113 PID 944 wrote to memory of 2292 944 9D3C83~1.EXE 113 PID 2292 wrote to memory of 4296 2292 svchost.com 93 PID 2292 wrote to memory of 4296 2292 svchost.com 93 PID 2292 wrote to memory of 4296 2292 svchost.com 93 PID 4296 wrote to memory of 3720 4296 9D3C83~1.EXE 149 PID 4296 wrote to memory of 3720 4296 9D3C83~1.EXE 149 PID 4296 wrote to memory of 3720 4296 9D3C83~1.EXE 149 PID 3720 wrote to memory of 3724 3720 svchost.com 117 PID 3720 wrote to memory of 3724 3720 svchost.com 117 PID 3720 wrote to memory of 3724 3720 svchost.com 117 PID 3724 wrote to memory of 4436 3724 9D3C83~1.EXE 96 PID 3724 wrote to memory of 4436 3724 9D3C83~1.EXE 96 PID 3724 wrote to memory of 4436 3724 9D3C83~1.EXE 96 PID 4436 wrote to memory of 4540 4436 svchost.com 97 PID 4436 wrote to memory of 4540 4436 svchost.com 97 PID 4436 wrote to memory of 4540 4436 svchost.com 97 PID 4540 wrote to memory of 2948 4540 9D3C83~1.EXE 152 PID 4540 wrote to memory of 2948 4540 9D3C83~1.EXE 152 PID 4540 wrote to memory of 2948 4540 9D3C83~1.EXE 152 PID 2948 wrote to memory of 2256 2948 svchost.com 99 PID 2948 wrote to memory of 2256 2948 svchost.com 99 PID 2948 wrote to memory of 2256 2948 svchost.com 99 PID 2256 wrote to memory of 372 2256 9D3C83~1.EXE 158 PID 2256 wrote to memory of 372 2256 9D3C83~1.EXE 158 PID 2256 wrote to memory of 372 2256 9D3C83~1.EXE 158 PID 372 wrote to memory of 2984 372 svchost.com 126 PID 372 wrote to memory of 2984 372 svchost.com 126 PID 372 wrote to memory of 2984 372 svchost.com 126 PID 2984 wrote to memory of 1332 2984 9D3C83~1.EXE 102 PID 2984 wrote to memory of 1332 2984 9D3C83~1.EXE 102 PID 2984 wrote to memory of 1332 2984 9D3C83~1.EXE 102 PID 1332 wrote to memory of 2732 1332 svchost.com 103 PID 1332 wrote to memory of 2732 1332 svchost.com 103 PID 1332 wrote to memory of 2732 1332 svchost.com 103 PID 2732 wrote to memory of 2020 2732 9D3C83~1.EXE 104 PID 2732 wrote to memory of 2020 2732 9D3C83~1.EXE 104 PID 2732 wrote to memory of 2020 2732 9D3C83~1.EXE 104 PID 2020 wrote to memory of 740 2020 svchost.com 211 PID 2020 wrote to memory of 740 2020 svchost.com 211 PID 2020 wrote to memory of 740 2020 svchost.com 211 PID 740 wrote to memory of 408 740 9D3C83~1.EXE 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe"C:\Users\Admin\AppData\Local\Temp\9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\9d3c832f54f4d3e2bbc1d067cbd246b836a4de2002ed44ec70e859f50fe5efa7N.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE8⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"15⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"21⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"23⤵
- Executes dropped EXE
PID:408 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"25⤵
- Executes dropped EXE
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE26⤵
- Executes dropped EXE
- Modifies registry class
PID:4852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"29⤵
- Executes dropped EXE
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE30⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"31⤵
- Executes dropped EXE
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
PID:4560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"33⤵
- Executes dropped EXE
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE34⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"35⤵
- Executes dropped EXE
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"39⤵
- Executes dropped EXE
PID:448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2408 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE42⤵
- Executes dropped EXE
PID:4128 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"43⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"45⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE46⤵
- Executes dropped EXE
PID:5112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"47⤵
- Executes dropped EXE
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE48⤵
- Executes dropped EXE
PID:2876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"49⤵
- Executes dropped EXE
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:60 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"51⤵
- Executes dropped EXE
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
PID:2288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"53⤵
- Executes dropped EXE
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE54⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"55⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE58⤵
- Executes dropped EXE
- Modifies registry class
PID:2196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"59⤵
- Executes dropped EXE
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
PID:5080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"63⤵
- Executes dropped EXE
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE64⤵
- Executes dropped EXE
- Modifies registry class
PID:1528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"65⤵
- Executes dropped EXE
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE66⤵
- Checks computer location settings
PID:3720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"67⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE68⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:748 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"69⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE70⤵
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"71⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE72⤵
- Checks computer location settings
PID:2208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"73⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE74⤵
- Checks computer location settings
- Modifies registry class
PID:2204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"75⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE76⤵
- Checks computer location settings
PID:3124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE78⤵
- Modifies registry class
PID:4912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"79⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE80⤵
- Checks computer location settings
PID:2660 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"81⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE82⤵
- Checks computer location settings
PID:216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"83⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE84⤵
- Modifies registry class
PID:3096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"85⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE86⤵
- Drops file in Windows directory
- Modifies registry class
PID:1656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"87⤵
- System Location Discovery: System Language Discovery
PID:64 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE88⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"89⤵PID:4168
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE90⤵
- Drops file in Windows directory
- Modifies registry class
PID:3496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"91⤵
- Drops file in Windows directory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE92⤵
- Drops file in Windows directory
PID:760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"93⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE94⤵
- Checks computer location settings
- Modifies registry class
PID:3564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"95⤵PID:1296
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE96⤵
- Modifies registry class
PID:1940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"97⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE98⤵PID:2436
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"99⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE100⤵
- Checks computer location settings
PID:3276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"101⤵PID:836
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE102⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:3416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"103⤵
- System Location Discovery: System Language Discovery
PID:4612 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE104⤵
- Modifies registry class
PID:660 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"105⤵
- System Location Discovery: System Language Discovery
PID:4904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE106⤵
- Modifies registry class
PID:2424 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"107⤵PID:4104
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE108⤵
- Checks computer location settings
PID:4972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"109⤵PID:5036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE110⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"111⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE112⤵
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"113⤵PID:3944
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE114⤵
- Modifies registry class
PID:4700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"115⤵PID:4844
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE116⤵
- System Location Discovery: System Language Discovery
PID:1216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"117⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE118⤵
- System Location Discovery: System Language Discovery
PID:4672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"119⤵PID:3948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE120⤵
- Checks computer location settings
PID:4996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE"121⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\9D3C83~1.EXE122⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2372
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-