Analysis
-
max time kernel
42s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 08:25
Behavioral task
behavioral1
Sample
005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe
Resource
win10v2004-20241007-en
General
-
Target
005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe
-
Size
717KB
-
MD5
d6b5e001f64698d45727381698eea840
-
SHA1
dc00295dd076c771612cbdb8b923aea4dc21bc8d
-
SHA256
005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebf
-
SHA512
bec731a232554e1e23ec5a139f649c16e46d5fbc10b7c4ba03f8cedcbdfeac64d91fbe0ef87019a1fb87f6319ae380b505af94fbcfb839e2982989b35865b78c
-
SSDEEP
6144:k9O0bWLqHxR58GSOEfY1o3eWIdJ20r376dvciiw0CO979:Hsr8HOEfY1ouPJ22376dvx0
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0008000000023caa-4.dat family_neshta behavioral2/files/0x0007000000023caf-10.dat family_neshta behavioral2/memory/3512-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1456-26-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2340-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4868-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1692-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2356-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3752-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4432-63-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4028-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3016-74-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/112-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1948-86-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3968-89-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0008000000020229-92.dat family_neshta behavioral2/memory/1860-106-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000202bc-115.dat family_neshta behavioral2/files/0x000400000002031e-120.dat family_neshta behavioral2/files/0x000400000002034b-114.dat family_neshta behavioral2/files/0x00010000000202a9-113.dat family_neshta behavioral2/files/0x000100000002023a-112.dat family_neshta behavioral2/files/0x0006000000020227-105.dat family_neshta behavioral2/memory/4420-122-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2040-132-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4988-134-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4780-145-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214ee-157.dat family_neshta behavioral2/files/0x00010000000214f0-156.dat family_neshta behavioral2/files/0x00010000000214ef-155.dat family_neshta behavioral2/memory/4280-181-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f32-176.dat family_neshta behavioral2/files/0x0001000000022f6f-175.dat family_neshta behavioral2/files/0x0001000000022f2d-174.dat family_neshta behavioral2/files/0x0001000000022f31-173.dat family_neshta behavioral2/memory/4776-158-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167eb-198.dat family_neshta behavioral2/files/0x000100000001dbcb-207.dat family_neshta behavioral2/files/0x000100000001dbbc-201.dat family_neshta behavioral2/files/0x0001000000016919-209.dat family_neshta behavioral2/files/0x0001000000016917-208.dat family_neshta behavioral2/memory/876-218-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2056-225-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4784-228-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2800-235-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1000-248-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1728-257-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3080-260-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4836-269-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4748-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2392-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4492-283-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3940-285-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1820-291-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1824-293-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2020-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3976-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/672-307-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3108-309-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3076-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2376-322-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1948-323-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4044-325-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1712-331-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 005E01~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 1064 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe 3512 svchost.com 1456 005E01~1.EXE 2340 svchost.com 4868 005E01~1.EXE 1692 svchost.com 2356 005E01~1.EXE 3752 svchost.com 4432 005E01~1.EXE 4028 svchost.com 3016 005E01~1.EXE 112 svchost.com 1948 005E01~1.EXE 3968 svchost.com 1860 005E01~1.EXE 4420 svchost.com 2040 005E01~1.EXE 4988 svchost.com 4780 005E01~1.EXE 4776 svchost.com 4280 005E01~1.EXE 876 svchost.com 2056 005E01~1.EXE 4784 svchost.com 2800 005E01~1.EXE 1000 svchost.com 1728 005E01~1.EXE 3080 svchost.com 4836 005E01~1.EXE 4748 svchost.com 2392 005E01~1.EXE 4492 svchost.com 3940 005E01~1.EXE 1820 svchost.com 1824 005E01~1.EXE 2020 svchost.com 3976 005E01~1.EXE 672 svchost.com 3108 005E01~1.EXE 3076 svchost.com 2376 005E01~1.EXE 1948 svchost.com 4044 005E01~1.EXE 1712 svchost.com 4556 005E01~1.EXE 4052 svchost.com 4076 005E01~1.EXE 952 svchost.com 4172 005E01~1.EXE 5112 svchost.com 916 005E01~1.EXE 3008 svchost.com 3672 005E01~1.EXE 2204 svchost.com 3832 005E01~1.EXE 2928 svchost.com 3920 005E01~1.EXE 3128 svchost.com 2208 005E01~1.EXE 3996 svchost.com 3408 005E01~1.EXE 5084 svchost.com 1600 005E01~1.EXE 1852 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 005E01~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\svchost.com 005E01~1.EXE File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 005E01~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 005E01~1.EXE File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\svchost.com 005E01~1.EXE File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\svchost.com 005E01~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 005E01~1.EXE File opened for modification C:\Windows\svchost.com 005E01~1.EXE File opened for modification C:\Windows\svchost.com 005E01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 005E01~1.EXE File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 005E01~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 005E01~1.EXE File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\directx.sys 005E01~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 005E01~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE Key created \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000_Classes\Local Settings 005E01~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3088 wrote to memory of 1064 3088 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe 83 PID 3088 wrote to memory of 1064 3088 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe 83 PID 3088 wrote to memory of 1064 3088 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe 83 PID 1064 wrote to memory of 3512 1064 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe 84 PID 1064 wrote to memory of 3512 1064 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe 84 PID 1064 wrote to memory of 3512 1064 005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe 84 PID 3512 wrote to memory of 1456 3512 svchost.com 85 PID 3512 wrote to memory of 1456 3512 svchost.com 85 PID 3512 wrote to memory of 1456 3512 svchost.com 85 PID 1456 wrote to memory of 2340 1456 005E01~1.EXE 86 PID 1456 wrote to memory of 2340 1456 005E01~1.EXE 86 PID 1456 wrote to memory of 2340 1456 005E01~1.EXE 86 PID 2340 wrote to memory of 4868 2340 svchost.com 87 PID 2340 wrote to memory of 4868 2340 svchost.com 87 PID 2340 wrote to memory of 4868 2340 svchost.com 87 PID 4868 wrote to memory of 1692 4868 005E01~1.EXE 88 PID 4868 wrote to memory of 1692 4868 005E01~1.EXE 88 PID 4868 wrote to memory of 1692 4868 005E01~1.EXE 88 PID 1692 wrote to memory of 2356 1692 svchost.com 89 PID 1692 wrote to memory of 2356 1692 svchost.com 89 PID 1692 wrote to memory of 2356 1692 svchost.com 89 PID 2356 wrote to memory of 3752 2356 005E01~1.EXE 90 PID 2356 wrote to memory of 3752 2356 005E01~1.EXE 90 PID 2356 wrote to memory of 3752 2356 005E01~1.EXE 90 PID 3752 wrote to memory of 4432 3752 svchost.com 91 PID 3752 wrote to memory of 4432 3752 svchost.com 91 PID 3752 wrote to memory of 4432 3752 svchost.com 91 PID 4432 wrote to memory of 4028 4432 005E01~1.EXE 92 PID 4432 wrote to memory of 4028 4432 005E01~1.EXE 92 PID 4432 wrote to memory of 4028 4432 005E01~1.EXE 92 PID 4028 wrote to memory of 3016 4028 svchost.com 160 PID 4028 wrote to memory of 3016 4028 svchost.com 160 PID 4028 wrote to memory of 3016 4028 svchost.com 160 PID 3016 wrote to memory of 112 3016 005E01~1.EXE 94 PID 3016 wrote to memory of 112 3016 005E01~1.EXE 94 PID 3016 wrote to memory of 112 3016 005E01~1.EXE 94 PID 112 wrote to memory of 1948 112 svchost.com 124 PID 112 wrote to memory of 1948 112 svchost.com 124 PID 112 wrote to memory of 1948 112 svchost.com 124 PID 1948 wrote to memory of 3968 1948 005E01~1.EXE 96 PID 1948 wrote to memory of 3968 1948 005E01~1.EXE 96 PID 1948 wrote to memory of 3968 1948 005E01~1.EXE 96 PID 3968 wrote to memory of 1860 3968 svchost.com 97 PID 3968 wrote to memory of 1860 3968 svchost.com 97 PID 3968 wrote to memory of 1860 3968 svchost.com 97 PID 1860 wrote to memory of 4420 1860 005E01~1.EXE 98 PID 1860 wrote to memory of 4420 1860 005E01~1.EXE 98 PID 1860 wrote to memory of 4420 1860 005E01~1.EXE 98 PID 4420 wrote to memory of 2040 4420 svchost.com 169 PID 4420 wrote to memory of 2040 4420 svchost.com 169 PID 4420 wrote to memory of 2040 4420 svchost.com 169 PID 2040 wrote to memory of 4988 2040 005E01~1.EXE 100 PID 2040 wrote to memory of 4988 2040 005E01~1.EXE 100 PID 2040 wrote to memory of 4988 2040 005E01~1.EXE 100 PID 4988 wrote to memory of 4780 4988 svchost.com 101 PID 4988 wrote to memory of 4780 4988 svchost.com 101 PID 4988 wrote to memory of 4780 4988 svchost.com 101 PID 4780 wrote to memory of 4776 4780 005E01~1.EXE 102 PID 4780 wrote to memory of 4776 4780 005E01~1.EXE 102 PID 4780 wrote to memory of 4776 4780 005E01~1.EXE 102 PID 4776 wrote to memory of 4280 4776 svchost.com 103 PID 4776 wrote to memory of 4280 4776 svchost.com 103 PID 4776 wrote to memory of 4280 4776 svchost.com 103 PID 4280 wrote to memory of 876 4280 005E01~1.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe"C:\Users\Admin\AppData\Local\Temp\005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\005e013db1522fe8f97efc49b738188429d2b8c098d586bc150b85c362e40ebfN.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE8⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3752 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"23⤵
- Executes dropped EXE
PID:876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE24⤵
- Executes dropped EXE
PID:2056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"25⤵
- Executes dropped EXE
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"27⤵
- Executes dropped EXE
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
PID:1728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"29⤵
- Executes dropped EXE
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4836 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"31⤵
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
PID:2392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"33⤵
- Executes dropped EXE
PID:4492 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE34⤵
- Executes dropped EXE
PID:3940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"35⤵
- Executes dropped EXE
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
PID:1824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE40⤵
- Executes dropped EXE
PID:3108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"41⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE42⤵
- Executes dropped EXE
- Modifies registry class
PID:2376 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"45⤵
- Executes dropped EXE
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"49⤵
- Executes dropped EXE
PID:952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"51⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:916 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"53⤵
- Executes dropped EXE
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"55⤵
- Executes dropped EXE
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE56⤵
- Executes dropped EXE
PID:3832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"57⤵
- Executes dropped EXE
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE58⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3128 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
PID:2208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3996 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
PID:3408 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5084 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE64⤵
- Executes dropped EXE
PID:1600 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"65⤵
- Executes dropped EXE
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE66⤵
- Checks computer location settings
PID:4464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"67⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE68⤵
- Checks computer location settings
- Drops file in Windows directory
PID:1728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"69⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE70⤵
- Checks computer location settings
PID:1968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"71⤵PID:1196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE72⤵
- Drops file in Windows directory
PID:4616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"73⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE74⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2628 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"75⤵
- Drops file in Windows directory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE76⤵PID:1824
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"77⤵
- Drops file in Windows directory
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE78⤵
- Modifies registry class
PID:516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"79⤵
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE80⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"81⤵PID:4180
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE82⤵
- Checks computer location settings
PID:4652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"83⤵PID:4792
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE84⤵PID:2896
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"85⤵
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE86⤵
- Checks computer location settings
PID:4556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"87⤵
- Drops file in Windows directory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE88⤵
- Checks computer location settings
- Modifies registry class
PID:2040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"89⤵PID:4720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE90⤵
- Modifies registry class
PID:4172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"91⤵PID:4148
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE92⤵
- Checks computer location settings
PID:772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"93⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE94⤵
- Checks computer location settings
- Modifies registry class
PID:2452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"95⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE96⤵
- Drops file in Windows directory
PID:2928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"97⤵PID:4920
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE98⤵
- Modifies registry class
PID:3920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"99⤵
- Drops file in Windows directory
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE100⤵
- Modifies registry class
PID:2868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"101⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE102⤵
- Checks computer location settings
PID:1084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"103⤵
- System Location Discovery: System Language Discovery
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE104⤵
- System Location Discovery: System Language Discovery
PID:1600 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"105⤵
- System Location Discovery: System Language Discovery
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE106⤵
- System Location Discovery: System Language Discovery
PID:4864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"107⤵
- Drops file in Windows directory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE108⤵PID:4188
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"109⤵PID:3696
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE110⤵
- Modifies registry class
PID:1136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:3264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE112⤵
- Modifies registry class
PID:1200 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"113⤵PID:3956
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE114⤵
- Checks computer location settings
PID:1476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"115⤵PID:3452
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE116⤵
- Checks computer location settings
- Modifies registry class
PID:672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"117⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE118⤵PID:3720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"119⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE120⤵PID:4660
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE"121⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\005E01~1.EXE122⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2960
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-