Analysis
-
max time kernel
29s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 18:15
Behavioral task
behavioral1
Sample
fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe
Resource
win10v2004-20241007-en
General
-
Target
fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe
-
Size
933KB
-
MD5
f801005dffc600b995e1b41339a378d0
-
SHA1
d6684a0dbee4efa740e077ea9047b67436d65062
-
SHA256
fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cd
-
SHA512
a2bf657978471cdaf95a28ee50aa4e9a493ed7128086e063f7abfb071f29d2c2b15b1aeaf094b3658d54c222662e14ff079a248002a3c395e80adba9af46ea08
-
SSDEEP
6144:k9IW4PmT1oh8aquaGHxk12+Mo94949494949494949494949494949494949:84PI1oCdI
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral1/files/0x0009000000016d64-2.dat family_neshta behavioral1/files/0x0008000000016d69-15.dat family_neshta behavioral1/files/0x0001000000010312-19.dat family_neshta behavioral1/files/0x0001000000010314-20.dat family_neshta behavioral1/files/0x0005000000010351-18.dat family_neshta behavioral1/files/0x0002000000010484-17.dat family_neshta behavioral1/memory/2888-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2932-31-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2756-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2732-43-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2804-59-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1788-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2452-73-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2712-72-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2464-87-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2124-86-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1764-109-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2440-110-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/924-115-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1732-114-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/files/0x000100000000f7d8-126.dat family_neshta behavioral1/files/0x000100000000f77b-134.dat family_neshta behavioral1/files/0x000100000000f7eb-136.dat family_neshta behavioral1/files/0x000100000000f7cf-135.dat family_neshta behavioral1/files/0x000100000000f7dd-133.dat family_neshta behavioral1/memory/1044-141-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3024-140-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2252-153-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2176-154-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2296-166-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1736-165-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2540-186-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2536-185-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2812-201-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1812-200-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1904-214-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2704-213-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1864-221-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2432-222-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1888-231-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2520-230-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3040-251-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/868-252-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3056-273-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2880-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2744-291-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2564-292-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2216-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1940-302-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1036-316-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2448-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2712-327-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2648-326-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2124-336-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2356-335-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1824-344-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/952-343-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1128-352-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2440-351-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2924-360-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2568-359-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2276-368-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3024-367-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2660-376-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Executes dropped EXE 64 IoCs
pid Process 2484 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 2888 svchost.com 2932 FA9309~1.EXE 2756 svchost.com 2732 FA9309~1.EXE 2804 svchost.com 1788 FA9309~1.EXE 2712 svchost.com 2452 FA9309~1.EXE 2464 svchost.com 2124 FA9309~1.EXE 1764 svchost.com 2440 FA9309~1.EXE 924 svchost.com 1732 FA9309~1.EXE 3024 svchost.com 1044 FA9309~1.EXE 2176 svchost.com 2252 FA9309~1.EXE 2296 svchost.com 1736 FA9309~1.EXE 2540 svchost.com 2536 FA9309~1.EXE 2812 svchost.com 1812 FA9309~1.EXE 1904 svchost.com 2704 FA9309~1.EXE 2432 svchost.com 1864 FA9309~1.EXE 1888 svchost.com 2520 FA9309~1.EXE 868 svchost.com 3040 FA9309~1.EXE 2880 svchost.com 3056 FA9309~1.EXE 2564 svchost.com 2744 FA9309~1.EXE 2216 svchost.com 1940 FA9309~1.EXE 1036 svchost.com 2448 FA9309~1.EXE 2712 svchost.com 2648 FA9309~1.EXE 2124 svchost.com 2356 FA9309~1.EXE 1824 svchost.com 952 FA9309~1.EXE 2440 svchost.com 1128 FA9309~1.EXE 2924 svchost.com 2568 FA9309~1.EXE 2276 svchost.com 3024 FA9309~1.EXE 2660 svchost.com 1644 FA9309~1.EXE 2436 svchost.com 1852 FA9309~1.EXE 1284 svchost.com 2272 FA9309~1.EXE 2392 svchost.com 2816 FA9309~1.EXE 2684 svchost.com 1840 FA9309~1.EXE 1516 svchost.com -
Loads dropped DLL 64 IoCs
pid Process 2164 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 2164 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 2888 svchost.com 2888 svchost.com 2756 svchost.com 2756 svchost.com 2804 svchost.com 2804 svchost.com 2712 svchost.com 2712 svchost.com 2464 svchost.com 2464 svchost.com 1764 svchost.com 1764 svchost.com 924 svchost.com 924 svchost.com 3024 svchost.com 3024 svchost.com 2164 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 2484 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 2484 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 2176 svchost.com 2176 svchost.com 2484 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 2296 svchost.com 2296 svchost.com 2540 svchost.com 2540 svchost.com 2812 svchost.com 2812 svchost.com 2484 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 1904 svchost.com 1904 svchost.com 2484 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 2432 svchost.com 2432 svchost.com 1888 svchost.com 1888 svchost.com 868 svchost.com 868 svchost.com 2484 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 2880 svchost.com 2880 svchost.com 2484 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 2564 svchost.com 2564 svchost.com 2484 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 2216 svchost.com 2216 svchost.com 1036 svchost.com 1036 svchost.com 2712 svchost.com 2712 svchost.com 2484 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 2124 svchost.com 2124 svchost.com 1824 svchost.com 1824 svchost.com 2440 svchost.com 2440 svchost.com 2924 svchost.com 2924 svchost.com 2276 svchost.com 2276 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\SOURCE~1\OSE.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmplayer.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~2.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTE.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\SELFCERT.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\1033\ONELEV.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GRAPH.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE -
Modifies registry class 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2484 2164 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 29 PID 2164 wrote to memory of 2484 2164 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 29 PID 2164 wrote to memory of 2484 2164 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 29 PID 2164 wrote to memory of 2484 2164 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 29 PID 2484 wrote to memory of 2888 2484 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 30 PID 2484 wrote to memory of 2888 2484 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 30 PID 2484 wrote to memory of 2888 2484 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 30 PID 2484 wrote to memory of 2888 2484 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 30 PID 2888 wrote to memory of 2932 2888 svchost.com 31 PID 2888 wrote to memory of 2932 2888 svchost.com 31 PID 2888 wrote to memory of 2932 2888 svchost.com 31 PID 2888 wrote to memory of 2932 2888 svchost.com 31 PID 2932 wrote to memory of 2756 2932 FA9309~1.EXE 32 PID 2932 wrote to memory of 2756 2932 FA9309~1.EXE 32 PID 2932 wrote to memory of 2756 2932 FA9309~1.EXE 32 PID 2932 wrote to memory of 2756 2932 FA9309~1.EXE 32 PID 2756 wrote to memory of 2732 2756 svchost.com 33 PID 2756 wrote to memory of 2732 2756 svchost.com 33 PID 2756 wrote to memory of 2732 2756 svchost.com 33 PID 2756 wrote to memory of 2732 2756 svchost.com 33 PID 2732 wrote to memory of 2804 2732 FA9309~1.EXE 34 PID 2732 wrote to memory of 2804 2732 FA9309~1.EXE 34 PID 2732 wrote to memory of 2804 2732 FA9309~1.EXE 34 PID 2732 wrote to memory of 2804 2732 FA9309~1.EXE 34 PID 2804 wrote to memory of 1788 2804 svchost.com 35 PID 2804 wrote to memory of 1788 2804 svchost.com 35 PID 2804 wrote to memory of 1788 2804 svchost.com 35 PID 2804 wrote to memory of 1788 2804 svchost.com 35 PID 1788 wrote to memory of 2712 1788 FA9309~1.EXE 70 PID 1788 wrote to memory of 2712 1788 FA9309~1.EXE 70 PID 1788 wrote to memory of 2712 1788 FA9309~1.EXE 70 PID 1788 wrote to memory of 2712 1788 FA9309~1.EXE 70 PID 2712 wrote to memory of 2452 2712 svchost.com 37 PID 2712 wrote to memory of 2452 2712 svchost.com 37 PID 2712 wrote to memory of 2452 2712 svchost.com 37 PID 2712 wrote to memory of 2452 2712 svchost.com 37 PID 2452 wrote to memory of 2464 2452 FA9309~1.EXE 38 PID 2452 wrote to memory of 2464 2452 FA9309~1.EXE 38 PID 2452 wrote to memory of 2464 2452 FA9309~1.EXE 38 PID 2452 wrote to memory of 2464 2452 FA9309~1.EXE 38 PID 2464 wrote to memory of 2124 2464 svchost.com 119 PID 2464 wrote to memory of 2124 2464 svchost.com 119 PID 2464 wrote to memory of 2124 2464 svchost.com 119 PID 2464 wrote to memory of 2124 2464 svchost.com 119 PID 2124 wrote to memory of 1764 2124 FA9309~1.EXE 121 PID 2124 wrote to memory of 1764 2124 FA9309~1.EXE 121 PID 2124 wrote to memory of 1764 2124 FA9309~1.EXE 121 PID 2124 wrote to memory of 1764 2124 FA9309~1.EXE 121 PID 1764 wrote to memory of 2440 1764 svchost.com 76 PID 1764 wrote to memory of 2440 1764 svchost.com 76 PID 1764 wrote to memory of 2440 1764 svchost.com 76 PID 1764 wrote to memory of 2440 1764 svchost.com 76 PID 2440 wrote to memory of 924 2440 FA9309~1.EXE 42 PID 2440 wrote to memory of 924 2440 FA9309~1.EXE 42 PID 2440 wrote to memory of 924 2440 FA9309~1.EXE 42 PID 2440 wrote to memory of 924 2440 FA9309~1.EXE 42 PID 924 wrote to memory of 1732 924 svchost.com 122 PID 924 wrote to memory of 1732 924 svchost.com 122 PID 924 wrote to memory of 1732 924 svchost.com 122 PID 924 wrote to memory of 1732 924 svchost.com 122 PID 1732 wrote to memory of 3024 1732 FA9309~1.EXE 81 PID 1732 wrote to memory of 3024 1732 FA9309~1.EXE 81 PID 1732 wrote to memory of 3024 1732 FA9309~1.EXE 81 PID 1732 wrote to memory of 3024 1732 FA9309~1.EXE 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe"C:\Users\Admin\AppData\Local\Temp\fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\3582-490\fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE8⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1788 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE20⤵
- Executes dropped EXE
PID:2252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE22⤵
- Executes dropped EXE
PID:1736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE24⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE28⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE32⤵
- Executes dropped EXE
PID:2520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
PID:868 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE34⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE38⤵
- Executes dropped EXE
PID:2744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE40⤵
- Executes dropped EXE
PID:1940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE46⤵
- Executes dropped EXE
PID:2356 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE50⤵
- Executes dropped EXE
PID:1128 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE52⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE54⤵
- Executes dropped EXE
PID:3024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"55⤵
- Executes dropped EXE
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"57⤵
- Executes dropped EXE
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE58⤵
- Executes dropped EXE
PID:1852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"59⤵
- Executes dropped EXE
PID:1284 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"61⤵
- Executes dropped EXE
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE62⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE64⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE66⤵
- Drops file in Windows directory
PID:1812 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"67⤵
- Drops file in Windows directory
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE68⤵PID:1904
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"69⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE70⤵PID:836
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"71⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE72⤵PID:2348
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"73⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE74⤵PID:2644
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"75⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE76⤵
- Drops file in Windows directory
PID:3040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE78⤵
- Drops file in Windows directory
PID:2872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"79⤵
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE80⤵PID:3064
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"81⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE82⤵
- Drops file in Windows directory
PID:2756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"83⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE84⤵
- Drops file in Windows directory
PID:956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"85⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE86⤵PID:1612
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"87⤵
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE88⤵PID:588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"89⤵
- Drops file in Windows directory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE90⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"91⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE92⤵
- Drops file in Windows directory
PID:2124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"93⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE94⤵PID:1764
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"95⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE96⤵PID:2928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"97⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE98⤵PID:2568
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"99⤵
- Drops file in Windows directory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE100⤵PID:2276
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"101⤵
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE102⤵
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"103⤵
- System Location Discovery: System Language Discovery
PID:908 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE104⤵PID:608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"105⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE106⤵
- System Location Discovery: System Language Discovery
PID:236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"107⤵PID:396
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE108⤵PID:2540
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"109⤵
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE110⤵PID:2708
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE112⤵PID:620
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"113⤵
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE114⤵
- Drops file in Windows directory
PID:2428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"115⤵
- System Location Discovery: System Language Discovery
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE116⤵
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"117⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE118⤵
- Drops file in Windows directory
PID:1924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"119⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE120⤵PID:1600
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"121⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE122⤵
- System Location Discovery: System Language Discovery
PID:2456
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-