Analysis
-
max time kernel
70s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-01-2025 18:15
Behavioral task
behavioral1
Sample
fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe
Resource
win10v2004-20241007-en
General
-
Target
fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe
-
Size
933KB
-
MD5
f801005dffc600b995e1b41339a378d0
-
SHA1
d6684a0dbee4efa740e077ea9047b67436d65062
-
SHA256
fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cd
-
SHA512
a2bf657978471cdaf95a28ee50aa4e9a493ed7128086e063f7abfb071f29d2c2b15b1aeaf094b3658d54c222662e14ff079a248002a3c395e80adba9af46ea08
-
SSDEEP
6144:k9IW4PmT1oh8aquaGHxk12+Mo94949494949494949494949494949494949:84PI1oCdI
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000b000000023b5b-4.dat family_neshta behavioral2/files/0x000a000000023b60-11.dat family_neshta behavioral2/memory/2372-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3224-20-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1696-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1228-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1240-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4912-51-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3408-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3996-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4068-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/100-75-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1708-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/60-87-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4896-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/852-92-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002034d-101.dat family_neshta behavioral2/memory/4516-105-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000600000002021c-108.dat family_neshta behavioral2/files/0x000100000002022f-111.dat family_neshta behavioral2/files/0x0004000000020352-122.dat family_neshta behavioral2/files/0x00010000000202b1-121.dat family_neshta behavioral2/files/0x0006000000020237-134.dat family_neshta behavioral2/files/0x0004000000020313-133.dat family_neshta behavioral2/memory/8-118-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4076-135-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3536-146-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4992-147-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2572-151-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000225e2-167.dat family_neshta behavioral2/files/0x0001000000021539-166.dat family_neshta behavioral2/files/0x00010000000214e4-179.dat family_neshta behavioral2/files/0x00010000000214e3-178.dat family_neshta behavioral2/files/0x0001000000022f2f-195.dat family_neshta behavioral2/memory/4060-199-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f33-194.dat family_neshta behavioral2/files/0x00010000000214e2-177.dat family_neshta behavioral2/memory/1940-173-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/440-230-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4920-238-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/516-241-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4288-258-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2312-260-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/956-267-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2960-275-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2888-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2140-285-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3948-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3728-293-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2132-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3068-301-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1992-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/880-309-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4764-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3556-317-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1568-319-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1812-325-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3280-332-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1204-333-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4608-340-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3160-341-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/8-343-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1300-349-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1236-351-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation FA9309~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 2268 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 2372 svchost.com 3224 FA9309~1.EXE 1696 svchost.com 1228 FA9309~1.EXE 1240 svchost.com 4912 FA9309~1.EXE 3408 svchost.com 3996 FA9309~1.EXE 4068 svchost.com 100 FA9309~1.EXE 1708 svchost.com 60 FA9309~1.EXE 4896 svchost.com 852 FA9309~1.EXE 4516 svchost.com 8 FA9309~1.EXE 4076 svchost.com 3536 FA9309~1.EXE 4992 svchost.com 2572 FA9309~1.EXE 1940 svchost.com 4060 FA9309~1.EXE 440 svchost.com 4920 FA9309~1.EXE 516 svchost.com 4288 FA9309~1.EXE 2312 svchost.com 956 FA9309~1.EXE 2960 svchost.com 2888 FA9309~1.EXE 2140 svchost.com 3948 FA9309~1.EXE 3728 svchost.com 2132 FA9309~1.EXE 3068 svchost.com 1992 FA9309~1.EXE 880 svchost.com 4764 FA9309~1.EXE 3556 svchost.com 1568 FA9309~1.EXE 1812 svchost.com 3280 FA9309~1.EXE 1204 svchost.com 4608 FA9309~1.EXE 3160 svchost.com 8 FA9309~1.EXE 1300 svchost.com 1236 FA9309~1.EXE 2308 svchost.com 4796 FA9309~1.EXE 4892 svchost.com 4932 FA9309~1.EXE 4388 svchost.com 4760 FA9309~1.EXE 4572 svchost.com 624 FA9309~1.EXE 3460 svchost.com 4168 FA9309~1.EXE 2884 svchost.com 3504 FA9309~1.EXE 640 svchost.com 4976 FA9309~1.EXE 3048 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaws.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FA9309~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FA9309~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FA9309~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FA9309~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings FA9309~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4164 wrote to memory of 2268 4164 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 82 PID 4164 wrote to memory of 2268 4164 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 82 PID 4164 wrote to memory of 2268 4164 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 82 PID 2268 wrote to memory of 2372 2268 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 83 PID 2268 wrote to memory of 2372 2268 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 83 PID 2268 wrote to memory of 2372 2268 fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe 83 PID 2372 wrote to memory of 3224 2372 svchost.com 84 PID 2372 wrote to memory of 3224 2372 svchost.com 84 PID 2372 wrote to memory of 3224 2372 svchost.com 84 PID 3224 wrote to memory of 1696 3224 FA9309~1.EXE 85 PID 3224 wrote to memory of 1696 3224 FA9309~1.EXE 85 PID 3224 wrote to memory of 1696 3224 FA9309~1.EXE 85 PID 1696 wrote to memory of 1228 1696 svchost.com 86 PID 1696 wrote to memory of 1228 1696 svchost.com 86 PID 1696 wrote to memory of 1228 1696 svchost.com 86 PID 1228 wrote to memory of 1240 1228 FA9309~1.EXE 87 PID 1228 wrote to memory of 1240 1228 FA9309~1.EXE 87 PID 1228 wrote to memory of 1240 1228 FA9309~1.EXE 87 PID 1240 wrote to memory of 4912 1240 svchost.com 88 PID 1240 wrote to memory of 4912 1240 svchost.com 88 PID 1240 wrote to memory of 4912 1240 svchost.com 88 PID 4912 wrote to memory of 3408 4912 FA9309~1.EXE 89 PID 4912 wrote to memory of 3408 4912 FA9309~1.EXE 89 PID 4912 wrote to memory of 3408 4912 FA9309~1.EXE 89 PID 3408 wrote to memory of 3996 3408 svchost.com 90 PID 3408 wrote to memory of 3996 3408 svchost.com 90 PID 3408 wrote to memory of 3996 3408 svchost.com 90 PID 3996 wrote to memory of 4068 3996 FA9309~1.EXE 91 PID 3996 wrote to memory of 4068 3996 FA9309~1.EXE 91 PID 3996 wrote to memory of 4068 3996 FA9309~1.EXE 91 PID 4068 wrote to memory of 100 4068 svchost.com 92 PID 4068 wrote to memory of 100 4068 svchost.com 92 PID 4068 wrote to memory of 100 4068 svchost.com 92 PID 100 wrote to memory of 1708 100 FA9309~1.EXE 93 PID 100 wrote to memory of 1708 100 FA9309~1.EXE 93 PID 100 wrote to memory of 1708 100 FA9309~1.EXE 93 PID 1708 wrote to memory of 60 1708 svchost.com 94 PID 1708 wrote to memory of 60 1708 svchost.com 94 PID 1708 wrote to memory of 60 1708 svchost.com 94 PID 60 wrote to memory of 4896 60 FA9309~1.EXE 95 PID 60 wrote to memory of 4896 60 FA9309~1.EXE 95 PID 60 wrote to memory of 4896 60 FA9309~1.EXE 95 PID 4896 wrote to memory of 852 4896 svchost.com 96 PID 4896 wrote to memory of 852 4896 svchost.com 96 PID 4896 wrote to memory of 852 4896 svchost.com 96 PID 852 wrote to memory of 4516 852 FA9309~1.EXE 97 PID 852 wrote to memory of 4516 852 FA9309~1.EXE 97 PID 852 wrote to memory of 4516 852 FA9309~1.EXE 97 PID 4516 wrote to memory of 8 4516 svchost.com 128 PID 4516 wrote to memory of 8 4516 svchost.com 128 PID 4516 wrote to memory of 8 4516 svchost.com 128 PID 8 wrote to memory of 4076 8 FA9309~1.EXE 99 PID 8 wrote to memory of 4076 8 FA9309~1.EXE 99 PID 8 wrote to memory of 4076 8 FA9309~1.EXE 99 PID 4076 wrote to memory of 3536 4076 svchost.com 100 PID 4076 wrote to memory of 3536 4076 svchost.com 100 PID 4076 wrote to memory of 3536 4076 svchost.com 100 PID 3536 wrote to memory of 4992 3536 FA9309~1.EXE 101 PID 3536 wrote to memory of 4992 3536 FA9309~1.EXE 101 PID 3536 wrote to memory of 4992 3536 FA9309~1.EXE 101 PID 4992 wrote to memory of 2572 4992 svchost.com 102 PID 4992 wrote to memory of 2572 4992 svchost.com 102 PID 4992 wrote to memory of 2572 4992 svchost.com 102 PID 2572 wrote to memory of 1940 2572 FA9309~1.EXE 173
Processes
-
C:\Users\Admin\AppData\Local\Temp\fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe"C:\Users\Admin\AppData\Local\Temp\fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Users\Admin\AppData\Local\Temp\3582-490\fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\fa9309085ed972b923d9c92f7618dd53e1673953ccbe528efb3af8705754a3cdN.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"23⤵
- Executes dropped EXE
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE24⤵
- Executes dropped EXE
PID:4060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"25⤵
- Executes dropped EXE
PID:440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE26⤵
- Executes dropped EXE
PID:4920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"29⤵
- Executes dropped EXE
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"31⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE32⤵
- Executes dropped EXE
PID:2888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"33⤵
- Executes dropped EXE
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
PID:3948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"35⤵
- Executes dropped EXE
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE36⤵
- Executes dropped EXE
PID:2132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"37⤵
- Executes dropped EXE
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE38⤵
- Executes dropped EXE
- Modifies registry class
PID:1992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"39⤵
- Executes dropped EXE
PID:880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE40⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3556 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE42⤵
- Executes dropped EXE
PID:1568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"43⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE44⤵
- Executes dropped EXE
PID:3280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"45⤵
- Executes dropped EXE
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE46⤵
- Executes dropped EXE
PID:4608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"47⤵
- Executes dropped EXE
PID:3160 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE48⤵
- Executes dropped EXE
PID:8 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"49⤵
- Executes dropped EXE
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"51⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE52⤵
- Executes dropped EXE
PID:4796 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"53⤵
- Executes dropped EXE
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"55⤵
- Executes dropped EXE
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE56⤵
- Executes dropped EXE
PID:4760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"57⤵
- Executes dropped EXE
PID:4572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE58⤵
- Executes dropped EXE
PID:624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"59⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE60⤵
- Executes dropped EXE
PID:4168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"61⤵
- Executes dropped EXE
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE62⤵
- Executes dropped EXE
- Modifies registry class
PID:3504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE66⤵
- Modifies registry class
PID:3760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"67⤵PID:4948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE68⤵
- Checks computer location settings
- Modifies registry class
PID:2892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"69⤵PID:1696
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE70⤵
- Modifies registry class
PID:3676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"71⤵PID:4836
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE72⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"73⤵PID:3688
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE74⤵PID:4088
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"75⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE76⤵
- Drops file in Windows directory
- Modifies registry class
PID:5088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"77⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE78⤵PID:2624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"79⤵
- System Location Discovery: System Language Discovery
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE80⤵
- Modifies registry class
PID:3768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"81⤵PID:4024
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE82⤵PID:1860
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"83⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE84⤵PID:1692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"85⤵
- System Location Discovery: System Language Discovery
PID:4616 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE86⤵PID:832
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"87⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE88⤵
- Checks computer location settings
- Modifies registry class
PID:2604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"89⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE90⤵
- Drops file in Windows directory
- Modifies registry class
PID:4156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"91⤵PID:5040
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE92⤵PID:5084
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"93⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE94⤵
- Drops file in Windows directory
PID:3392 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"95⤵
- Drops file in Windows directory
PID:4060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE96⤵PID:2332
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"97⤵
- Drops file in Windows directory
PID:4232 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE98⤵
- Modifies registry class
PID:1712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"99⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE100⤵PID:1220
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"101⤵
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE102⤵
- Checks computer location settings
PID:3216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"103⤵PID:4108
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE104⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"105⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE106⤵
- Checks computer location settings
PID:4724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"107⤵
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE108⤵PID:2892
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"109⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE110⤵PID:5096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"111⤵PID:5044
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE112⤵PID:2140
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"113⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE114⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"115⤵PID:4092
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE116⤵PID:3456
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"117⤵PID:3988
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE118⤵
- Checks computer location settings
PID:1368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"119⤵PID:3124
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE120⤵
- System Location Discovery: System Language Discovery
PID:3400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE"121⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FA9309~1.EXE122⤵
- Modifies registry class
PID:3328
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-