Analysis
-
max time kernel
95s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 00:43
Behavioral task
behavioral1
Sample
5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe
Resource
win10v2004-20241007-en
General
-
Target
5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe
-
Size
3.8MB
-
MD5
57036bd9f7b0b519e69c5988aeeb9063
-
SHA1
b57bd9bc6567cab34a322a24c9f2bf2415cb3447
-
SHA256
5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85
-
SHA512
dc91d4012f2f27c0e01c8d69aee060f3d912840c49f5f070f7289e32dcd0a49abefe82736da71ead79943078e3b165910ab8378487aabf9616258d8c078f969f
-
SSDEEP
49152:cGUtTof95iMXSm3KRgVTe/zz9ABmRTH9SWR9cqpqHLqTC6:aqSBA0uWRd6
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0008000000023c85-4.dat family_neshta behavioral2/files/0x0007000000023c8a-11.dat family_neshta behavioral2/memory/4796-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4576-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2320-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3360-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/660-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1984-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1420-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4864-62-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2676-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4348-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3640-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020343-78.dat family_neshta behavioral2/files/0x0006000000020216-84.dat family_neshta behavioral2/files/0x0004000000020336-100.dat family_neshta behavioral2/files/0x000600000002022d-112.dat family_neshta behavioral2/files/0x0004000000020309-111.dat family_neshta behavioral2/files/0x000100000002028f-110.dat family_neshta behavioral2/files/0x0001000000020294-99.dat family_neshta behavioral2/files/0x0001000000020225-98.dat family_neshta behavioral2/memory/1768-105-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000700000002027e-81.dat family_neshta behavioral2/memory/2556-113-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3220-117-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f2a-149.dat family_neshta behavioral2/files/0x0001000000022f69-154.dat family_neshta behavioral2/files/0x0001000000022f67-157.dat family_neshta behavioral2/memory/4720-162-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167f0-186.dat family_neshta behavioral2/memory/2696-190-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000100000001680d-173.dat family_neshta behavioral2/files/0x00010000000167d3-172.dat family_neshta behavioral2/files/0x000100000001685d-171.dat family_neshta behavioral2/files/0x00010000000167cf-170.dat family_neshta behavioral2/files/0x00010000000167d1-169.dat family_neshta behavioral2/files/0x00010000000167b6-168.dat family_neshta behavioral2/files/0x0001000000016808-167.dat family_neshta behavioral2/files/0x0001000000022f28-153.dat family_neshta behavioral2/memory/1164-205-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f2b-152.dat family_neshta behavioral2/files/0x0001000000022f68-151.dat family_neshta behavioral2/files/0x0001000000022f26-150.dat family_neshta behavioral2/memory/796-211-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214d9-146.dat family_neshta behavioral2/files/0x0001000000022f29-148.dat family_neshta behavioral2/files/0x00010000000214d8-134.dat family_neshta behavioral2/files/0x00010000000225d6-133.dat family_neshta behavioral2/memory/2684-231-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4512-238-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3848-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1496-248-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/8-249-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3480-251-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4868-257-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2212-260-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4836-265-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4048-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2712-273-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1608-275-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4528-281-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4948-283-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4144-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2268-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 5BF572~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 4696 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe 4796 svchost.com 4576 5BF572~1.EXE 2320 svchost.com 3360 5BF572~1.EXE 660 svchost.com 1984 5BF572~1.EXE 1420 svchost.com 4864 5BF572~1.EXE 2676 svchost.com 4348 5BF572~1.EXE 3640 svchost.com 1768 5BF572~1.EXE 2556 svchost.com 3220 5BF572~1.EXE 4720 svchost.com 2696 5BF572~1.EXE 1164 svchost.com 796 5BF572~1.EXE 2684 svchost.com 4512 5BF572~1.EXE 3848 svchost.com 1496 5BF572~1.EXE 8 svchost.com 3480 5BF572~1.EXE 4868 svchost.com 2212 5BF572~1.EXE 4836 svchost.com 4048 5BF572~1.EXE 2712 svchost.com 1608 5BF572~1.EXE 4528 svchost.com 4948 5BF572~1.EXE 4144 svchost.com 2268 5BF572~1.EXE 1820 svchost.com 3596 5BF572~1.EXE 2676 svchost.com 3512 5BF572~1.EXE 4892 svchost.com 2532 5BF572~1.EXE 2140 svchost.com 1856 5BF572~1.EXE 4544 svchost.com 4840 5BF572~1.EXE 4112 svchost.com 1844 5BF572~1.EXE 3192 svchost.com 3720 5BF572~1.EXE 3304 svchost.com 4212 5BF572~1.EXE 4588 svchost.com 3568 5BF572~1.EXE 4748 svchost.com 1324 5BF572~1.EXE 932 svchost.com 3484 5BF572~1.EXE 2700 svchost.com 4088 5BF572~1.EXE 1308 svchost.com 1180 5BF572~1.EXE 5048 svchost.com 5040 5BF572~1.EXE 4216 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Checks system information in the registry 2 TTPs 2 IoCs
System information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName 5BF572~1.EXE Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer 5BF572~1.EXE -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaws.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 5BF572~1.EXE File opened for modification C:\Windows\directx.sys 5BF572~1.EXE File opened for modification C:\Windows\svchost.com 5BF572~1.EXE File opened for modification C:\Windows\svchost.com 5BF572~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 5BF572~1.EXE File opened for modification C:\Windows\directx.sys 5BF572~1.EXE File opened for modification C:\Windows\directx.sys 5BF572~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5BF572~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 5BF572~1.EXE File opened for modification C:\Windows\svchost.com 5BF572~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5BF572~1.EXE File opened for modification C:\Windows\directx.sys 5BF572~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 5BF572~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5BF572~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 5BF572~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 5BF572~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5BF572~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 5BF572~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 5BF572~1.EXE File opened for modification C:\Windows\svchost.com 5BF572~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5BF572~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 5BF572~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 5BF572~1.EXE File opened for modification C:\Windows\directx.sys 5BF572~1.EXE File opened for modification C:\Windows\directx.sys 5BF572~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 5BF572~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5BF572~1.EXE File opened for modification C:\Windows\svchost.com 5BF572~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 5BF572~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 5BF572~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 5BF572~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5BF572~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString wermgr.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 wermgr.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS wermgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU wermgr.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings 5BF572~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1048 wrote to memory of 4696 1048 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe 83 PID 1048 wrote to memory of 4696 1048 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe 83 PID 1048 wrote to memory of 4696 1048 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe 83 PID 4696 wrote to memory of 4796 4696 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe 84 PID 4696 wrote to memory of 4796 4696 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe 84 PID 4696 wrote to memory of 4796 4696 5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe 84 PID 4796 wrote to memory of 4576 4796 svchost.com 85 PID 4796 wrote to memory of 4576 4796 svchost.com 85 PID 4796 wrote to memory of 4576 4796 svchost.com 85 PID 4576 wrote to memory of 2320 4576 5BF572~1.EXE 86 PID 4576 wrote to memory of 2320 4576 5BF572~1.EXE 86 PID 4576 wrote to memory of 2320 4576 5BF572~1.EXE 86 PID 2320 wrote to memory of 3360 2320 svchost.com 87 PID 2320 wrote to memory of 3360 2320 svchost.com 87 PID 2320 wrote to memory of 3360 2320 svchost.com 87 PID 3360 wrote to memory of 660 3360 5BF572~1.EXE 88 PID 3360 wrote to memory of 660 3360 5BF572~1.EXE 88 PID 3360 wrote to memory of 660 3360 5BF572~1.EXE 88 PID 660 wrote to memory of 1984 660 svchost.com 89 PID 660 wrote to memory of 1984 660 svchost.com 89 PID 660 wrote to memory of 1984 660 svchost.com 89 PID 1984 wrote to memory of 1420 1984 5BF572~1.EXE 90 PID 1984 wrote to memory of 1420 1984 5BF572~1.EXE 90 PID 1984 wrote to memory of 1420 1984 5BF572~1.EXE 90 PID 1420 wrote to memory of 4864 1420 svchost.com 91 PID 1420 wrote to memory of 4864 1420 svchost.com 91 PID 1420 wrote to memory of 4864 1420 svchost.com 91 PID 4864 wrote to memory of 2676 4864 5BF572~1.EXE 120 PID 4864 wrote to memory of 2676 4864 5BF572~1.EXE 120 PID 4864 wrote to memory of 2676 4864 5BF572~1.EXE 120 PID 2676 wrote to memory of 4348 2676 svchost.com 93 PID 2676 wrote to memory of 4348 2676 svchost.com 93 PID 2676 wrote to memory of 4348 2676 svchost.com 93 PID 4348 wrote to memory of 3640 4348 5BF572~1.EXE 167 PID 4348 wrote to memory of 3640 4348 5BF572~1.EXE 167 PID 4348 wrote to memory of 3640 4348 5BF572~1.EXE 167 PID 3640 wrote to memory of 1768 3640 svchost.com 95 PID 3640 wrote to memory of 1768 3640 svchost.com 95 PID 3640 wrote to memory of 1768 3640 svchost.com 95 PID 1768 wrote to memory of 2556 1768 5BF572~1.EXE 96 PID 1768 wrote to memory of 2556 1768 5BF572~1.EXE 96 PID 1768 wrote to memory of 2556 1768 5BF572~1.EXE 96 PID 2556 wrote to memory of 3220 2556 svchost.com 166 PID 2556 wrote to memory of 3220 2556 svchost.com 166 PID 2556 wrote to memory of 3220 2556 svchost.com 166 PID 3220 wrote to memory of 4720 3220 5BF572~1.EXE 98 PID 3220 wrote to memory of 4720 3220 5BF572~1.EXE 98 PID 3220 wrote to memory of 4720 3220 5BF572~1.EXE 98 PID 4720 wrote to memory of 2696 4720 svchost.com 99 PID 4720 wrote to memory of 2696 4720 svchost.com 99 PID 4720 wrote to memory of 2696 4720 svchost.com 99 PID 2696 wrote to memory of 1164 2696 5BF572~1.EXE 100 PID 2696 wrote to memory of 1164 2696 5BF572~1.EXE 100 PID 2696 wrote to memory of 1164 2696 5BF572~1.EXE 100 PID 1164 wrote to memory of 796 1164 svchost.com 101 PID 1164 wrote to memory of 796 1164 svchost.com 101 PID 1164 wrote to memory of 796 1164 svchost.com 101 PID 796 wrote to memory of 2684 796 5BF572~1.EXE 102 PID 796 wrote to memory of 2684 796 5BF572~1.EXE 102 PID 796 wrote to memory of 2684 796 5BF572~1.EXE 102 PID 2684 wrote to memory of 4512 2684 svchost.com 103 PID 2684 wrote to memory of 4512 2684 svchost.com 103 PID 2684 wrote to memory of 4512 2684 svchost.com 103 PID 4512 wrote to memory of 3848 4512 5BF572~1.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe"C:\Users\Admin\AppData\Local\Temp\5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\5bf5726e36dbfb948b0ab535f665722688de3a1aae8a35f6931a06cf06cbfb85.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3360 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE20⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"23⤵
- Executes dropped EXE
PID:3848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE24⤵
- Executes dropped EXE
PID:1496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"25⤵
- Executes dropped EXE
PID:8 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE26⤵
- Executes dropped EXE
PID:3480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"27⤵
- Executes dropped EXE
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
PID:2212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE30⤵
- Executes dropped EXE
- Modifies registry class
PID:4048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE34⤵
- Executes dropped EXE
- Modifies registry class
PID:4948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"35⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE36⤵
- Executes dropped EXE
PID:2268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE38⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE40⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"41⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2532 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"43⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE44⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"45⤵
- Executes dropped EXE
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"49⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"51⤵
- Executes dropped EXE
PID:3304 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"53⤵
- Executes dropped EXE
PID:4588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE56⤵
- Executes dropped EXE
PID:1324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"59⤵
- Executes dropped EXE
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"61⤵
- Executes dropped EXE
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
PID:1180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE64⤵
- Executes dropped EXE
- Modifies registry class
PID:5040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"65⤵
- Executes dropped EXE
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE66⤵
- Checks computer location settings
- Modifies registry class
PID:4872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:4452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE68⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"69⤵
- Drops file in Windows directory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE70⤵
- Modifies registry class
PID:5024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"71⤵PID:4528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE72⤵PID:660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE74⤵
- Checks computer location settings
PID:1984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"75⤵PID:5028
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE76⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"77⤵
- Drops file in Windows directory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE78⤵PID:3184
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"79⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE80⤵
- Checks computer location settings
- Modifies registry class
PID:2776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"81⤵
- System Location Discovery: System Language Discovery
PID:228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE82⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"83⤵
- Drops file in Windows directory
PID:4064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE84⤵
- Checks computer location settings
- Modifies registry class
PID:3220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"85⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE86⤵
- Checks computer location settings
- Modifies registry class
PID:692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"87⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE88⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:3884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"89⤵
- Drops file in Windows directory
PID:872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE90⤵PID:4280
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"91⤵
- System Location Discovery: System Language Discovery
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE92⤵
- System Location Discovery: System Language Discovery
PID:400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"93⤵
- System Location Discovery: System Language Discovery
PID:4312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE94⤵
- Checks computer location settings
- Modifies registry class
PID:4464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"95⤵
- System Location Discovery: System Language Discovery
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE96⤵
- Modifies registry class
PID:4500 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"97⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE98⤵
- Modifies registry class
PID:3784 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE100⤵
- Drops file in Windows directory
- Modifies registry class
PID:2480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"101⤵PID:4040
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE102⤵
- Modifies registry class
PID:1988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"103⤵
- Drops file in Windows directory
PID:4488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE104⤵PID:4764
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"105⤵
- Drops file in Windows directory
PID:444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE106⤵
- Modifies registry class
PID:1180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"107⤵PID:4228
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE108⤵
- Checks computer location settings
PID:4868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"109⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE110⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"111⤵PID:1140
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE112⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"113⤵PID:3736
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE114⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"115⤵PID:4000
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE116⤵PID:4456
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:4360 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE118⤵
- Checks computer location settings
- Modifies registry class
PID:5080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"119⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE120⤵
- Checks computer location settings
PID:2268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE"121⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\5BF572~1.EXE122⤵
- Modifies registry class
PID:3064
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-