Analysis
-
max time kernel
94s -
max time network
99s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-01-2025 21:49
Behavioral task
behavioral1
Sample
3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe
Resource
win10v2004-20241007-en
General
-
Target
3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe
-
Size
3.3MB
-
MD5
70aa341fcacbabd0dd857f91b23b5649
-
SHA1
f5ac5b932c9730579d8cea4edeb47d66220d6299
-
SHA256
3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236
-
SHA512
1be761410c91fb1e5d4d635a6cdbadb68c8fd30d63e9486889655351ac0feb1224fd2a12e4e70f256162da6fb0ee49be3cff39e2a58cc688f1db147f3dd67d97
-
SSDEEP
49152:nglZ4ThD+gGTZbqZK95S4pTiX2EUqMzADxulO7Udq+KqOuBk7bVnU7woM2JtY:bs6Gwxul1EE4wJ
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000c000000023b85-4.dat family_neshta behavioral2/files/0x0008000000023b9f-10.dat family_neshta behavioral2/memory/1504-18-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4552-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3308-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4604-34-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3268-42-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4152-53-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1732-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/384-65-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4508-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5068-70-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020216-81.dat family_neshta behavioral2/files/0x0004000000020348-96.dat family_neshta behavioral2/files/0x00010000000202a7-95.dat family_neshta behavioral2/files/0x0004000000020336-94.dat family_neshta behavioral2/files/0x000600000002022d-101.dat family_neshta behavioral2/files/0x0004000000020309-100.dat family_neshta behavioral2/memory/2768-102-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2568-106-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/964-125-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4496-126-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000200000002030d-143.dat family_neshta behavioral2/memory/2776-146-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214d9-158.dat family_neshta behavioral2/files/0x0001000000022f2f-167.dat family_neshta behavioral2/files/0x0001000000022f6c-166.dat family_neshta behavioral2/files/0x00010000000167af-174.dat family_neshta behavioral2/files/0x000100000001dbd1-189.dat family_neshta behavioral2/files/0x0001000000016918-203.dat family_neshta behavioral2/files/0x000100000001691a-197.dat family_neshta behavioral2/files/0x00020000000215ca-210.dat family_neshta behavioral2/files/0x000200000000072d-209.dat family_neshta behavioral2/files/0x00010000000167e8-186.dat family_neshta behavioral2/files/0x000400000001e6aa-215.dat family_neshta behavioral2/files/0x0001000000016804-182.dat family_neshta behavioral2/files/0x0001000000016801-173.dat family_neshta behavioral2/files/0x0001000000022f2d-160.dat family_neshta behavioral2/files/0x00010000000214d8-157.dat family_neshta behavioral2/files/0x00010000000214da-156.dat family_neshta behavioral2/files/0x0006000000020235-128.dat family_neshta behavioral2/memory/3636-114-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000300000001e8c7-228.dat family_neshta behavioral2/memory/2052-232-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1444-238-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1500-239-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4772-241-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1072-247-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4564-249-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2832-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4440-257-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3952-263-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/952-265-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1196-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3276-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1848-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1092-286-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4120-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3680-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2452-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4860-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4044-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3036-310-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4208-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation 3C8953~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 2696 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe 1504 svchost.com 4552 3C8953~1.EXE 3308 svchost.com 4604 3C8953~1.EXE 3268 svchost.com 4152 3C8953~1.EXE 1732 svchost.com 384 3C8953~1.EXE 4508 svchost.com 5068 3C8953~1.EXE 2768 svchost.com 2568 3C8953~1.EXE 3636 svchost.com 964 3C8953~1.EXE 4496 svchost.com 2776 3C8953~1.EXE 2052 svchost.com 1444 3C8953~1.EXE 1500 svchost.com 4772 3C8953~1.EXE 1072 svchost.com 4564 3C8953~1.EXE 2832 svchost.com 4440 3C8953~1.EXE 3952 svchost.com 952 3C8953~1.EXE 1196 svchost.com 3276 3C8953~1.EXE 1848 svchost.com 1092 3C8953~1.EXE 4120 svchost.com 3680 3C8953~1.EXE 2452 svchost.com 4860 3C8953~1.EXE 4044 svchost.com 3036 3C8953~1.EXE 4208 svchost.com 2320 3C8953~1.EXE 4888 svchost.com 2564 3C8953~1.EXE 4872 svchost.com 3448 3C8953~1.EXE 4896 svchost.com 3504 3C8953~1.EXE 2072 svchost.com 1448 3C8953~1.EXE 636 svchost.com 4108 3C8953~1.EXE 4576 svchost.com 4132 3C8953~1.EXE 3800 svchost.com 3580 3C8953~1.EXE 1572 svchost.com 1764 3C8953~1.EXE 5044 svchost.com 5096 3C8953~1.EXE 4928 svchost.com 1880 3C8953~1.EXE 1988 svchost.com 540 3C8953~1.EXE 2460 svchost.com 2888 3C8953~1.EXE 3584 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaw.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3C8953~1.EXE File opened for modification C:\Windows\directx.sys 3C8953~1.EXE File opened for modification C:\Windows\svchost.com 3C8953~1.EXE File opened for modification C:\Windows\svchost.com 3C8953~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3C8953~1.EXE File opened for modification C:\Windows\directx.sys 3C8953~1.EXE File opened for modification C:\Windows\directx.sys 3C8953~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3C8953~1.EXE File opened for modification C:\Windows\directx.sys 3C8953~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3C8953~1.EXE File opened for modification C:\Windows\directx.sys 3C8953~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3C8953~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 3C8953~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3C8953~1.EXE File opened for modification C:\Windows\svchost.com 3C8953~1.EXE File opened for modification C:\Windows\directx.sys 3C8953~1.EXE File opened for modification C:\Windows\directx.sys 3C8953~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3C8953~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3C8953~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 3C8953~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3C8953~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3C8953~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3C8953~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3C8953~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 3C8953~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 3C8953~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 3C8953~1.EXE File opened for modification C:\Windows\svchost.com 3C8953~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 3C8953~1.EXE File opened for modification C:\Windows\directx.sys 3C8953~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3C8953~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE Key created \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000_Classes\Local Settings 3C8953~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2696 1900 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe 83 PID 1900 wrote to memory of 2696 1900 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe 83 PID 1900 wrote to memory of 2696 1900 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe 83 PID 2696 wrote to memory of 1504 2696 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe 84 PID 2696 wrote to memory of 1504 2696 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe 84 PID 2696 wrote to memory of 1504 2696 3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe 84 PID 1504 wrote to memory of 4552 1504 svchost.com 85 PID 1504 wrote to memory of 4552 1504 svchost.com 85 PID 1504 wrote to memory of 4552 1504 svchost.com 85 PID 4552 wrote to memory of 3308 4552 3C8953~1.EXE 86 PID 4552 wrote to memory of 3308 4552 3C8953~1.EXE 86 PID 4552 wrote to memory of 3308 4552 3C8953~1.EXE 86 PID 3308 wrote to memory of 4604 3308 svchost.com 87 PID 3308 wrote to memory of 4604 3308 svchost.com 87 PID 3308 wrote to memory of 4604 3308 svchost.com 87 PID 4604 wrote to memory of 3268 4604 3C8953~1.EXE 88 PID 4604 wrote to memory of 3268 4604 3C8953~1.EXE 88 PID 4604 wrote to memory of 3268 4604 3C8953~1.EXE 88 PID 3268 wrote to memory of 4152 3268 svchost.com 89 PID 3268 wrote to memory of 4152 3268 svchost.com 89 PID 3268 wrote to memory of 4152 3268 svchost.com 89 PID 4152 wrote to memory of 1732 4152 3C8953~1.EXE 90 PID 4152 wrote to memory of 1732 4152 3C8953~1.EXE 90 PID 4152 wrote to memory of 1732 4152 3C8953~1.EXE 90 PID 1732 wrote to memory of 384 1732 svchost.com 91 PID 1732 wrote to memory of 384 1732 svchost.com 91 PID 1732 wrote to memory of 384 1732 svchost.com 91 PID 384 wrote to memory of 4508 384 3C8953~1.EXE 92 PID 384 wrote to memory of 4508 384 3C8953~1.EXE 92 PID 384 wrote to memory of 4508 384 3C8953~1.EXE 92 PID 4508 wrote to memory of 5068 4508 svchost.com 161 PID 4508 wrote to memory of 5068 4508 svchost.com 161 PID 4508 wrote to memory of 5068 4508 svchost.com 161 PID 5068 wrote to memory of 2768 5068 3C8953~1.EXE 94 PID 5068 wrote to memory of 2768 5068 3C8953~1.EXE 94 PID 5068 wrote to memory of 2768 5068 3C8953~1.EXE 94 PID 2768 wrote to memory of 2568 2768 svchost.com 95 PID 2768 wrote to memory of 2568 2768 svchost.com 95 PID 2768 wrote to memory of 2568 2768 svchost.com 95 PID 2568 wrote to memory of 3636 2568 3C8953~1.EXE 96 PID 2568 wrote to memory of 3636 2568 3C8953~1.EXE 96 PID 2568 wrote to memory of 3636 2568 3C8953~1.EXE 96 PID 3636 wrote to memory of 964 3636 svchost.com 97 PID 3636 wrote to memory of 964 3636 svchost.com 97 PID 3636 wrote to memory of 964 3636 svchost.com 97 PID 964 wrote to memory of 4496 964 3C8953~1.EXE 98 PID 964 wrote to memory of 4496 964 3C8953~1.EXE 98 PID 964 wrote to memory of 4496 964 3C8953~1.EXE 98 PID 4496 wrote to memory of 2776 4496 svchost.com 99 PID 4496 wrote to memory of 2776 4496 svchost.com 99 PID 4496 wrote to memory of 2776 4496 svchost.com 99 PID 2776 wrote to memory of 2052 2776 3C8953~1.EXE 100 PID 2776 wrote to memory of 2052 2776 3C8953~1.EXE 100 PID 2776 wrote to memory of 2052 2776 3C8953~1.EXE 100 PID 2052 wrote to memory of 1444 2052 svchost.com 101 PID 2052 wrote to memory of 1444 2052 svchost.com 101 PID 2052 wrote to memory of 1444 2052 svchost.com 101 PID 1444 wrote to memory of 1500 1444 3C8953~1.EXE 179 PID 1444 wrote to memory of 1500 1444 3C8953~1.EXE 179 PID 1444 wrote to memory of 1500 1444 3C8953~1.EXE 179 PID 1500 wrote to memory of 4772 1500 svchost.com 103 PID 1500 wrote to memory of 4772 1500 svchost.com 103 PID 1500 wrote to memory of 4772 1500 svchost.com 103 PID 4772 wrote to memory of 1072 4772 3C8953~1.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe"C:\Users\Admin\AppData\Local\Temp\3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\3c89537f3f78c9943a03ecba118fa6434a92e992ffeef8b70a6966272ea96236.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE18⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE22⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE24⤵
- Executes dropped EXE
- Modifies registry class
PID:4564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"25⤵
- Executes dropped EXE
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE26⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"27⤵
- Executes dropped EXE
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE28⤵
- Executes dropped EXE
- Modifies registry class
PID:952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"29⤵
- Executes dropped EXE
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE30⤵
- Executes dropped EXE
PID:3276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
PID:1092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"33⤵
- Executes dropped EXE
PID:4120 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE34⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3680 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"35⤵
- Executes dropped EXE
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE36⤵
- Executes dropped EXE
- Modifies registry class
PID:4860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"37⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
PID:3036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE40⤵
- Executes dropped EXE
PID:2320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"41⤵
- Executes dropped EXE
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE42⤵
- Executes dropped EXE
- Modifies registry class
PID:2564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"43⤵
- Executes dropped EXE
PID:4872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE44⤵
- Executes dropped EXE
PID:3448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"45⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4896 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"47⤵
- Executes dropped EXE
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"49⤵
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE50⤵
- Executes dropped EXE
PID:4108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"51⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
PID:4132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"53⤵
- Executes dropped EXE
PID:3800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE54⤵
- Executes dropped EXE
- Modifies registry class
PID:3580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"55⤵
- Executes dropped EXE
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"57⤵
- Executes dropped EXE
PID:5044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
PID:5096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"59⤵
- Executes dropped EXE
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE60⤵
- Executes dropped EXE
PID:1880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
PID:540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"63⤵
- Executes dropped EXE
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"65⤵
- Executes dropped EXE
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE66⤵
- System Location Discovery: System Language Discovery
PID:3952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"67⤵PID:1504
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE68⤵PID:1196
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"69⤵
- System Location Discovery: System Language Discovery
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE70⤵
- Checks computer location settings
- Modifies registry class
PID:1844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"71⤵PID:3328
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE72⤵
- Checks computer location settings
PID:4304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"73⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE74⤵PID:2324
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"75⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE76⤵
- Checks computer location settings
PID:1956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"77⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE78⤵
- Checks computer location settings
PID:1548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"79⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE80⤵
- Modifies registry class
PID:2240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"81⤵PID:3676
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE82⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:1980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"83⤵PID:4560
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE84⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3124 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"85⤵PID:4460
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE86⤵PID:1120
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"87⤵PID:4136
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE88⤵PID:4356
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"89⤵
- Drops file in Windows directory
PID:3312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE90⤵PID:3780
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"91⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE92⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"93⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE94⤵
- Modifies registry class
PID:3000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"95⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE96⤵PID:3264
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"97⤵
- System Location Discovery: System Language Discovery
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE98⤵PID:5096
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"99⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE100⤵
- Checks computer location settings
PID:2228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"101⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE102⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"103⤵
- System Location Discovery: System Language Discovery
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE104⤵
- Checks computer location settings
PID:4300 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"105⤵PID:4416
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE106⤵
- Modifies registry class
PID:1788 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"107⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE108⤵
- Modifies registry class
PID:2372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"109⤵
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE110⤵
- Checks computer location settings
PID:2016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:3276 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE112⤵PID:5076
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"113⤵PID:4120
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE114⤵
- Checks computer location settings
- Modifies registry class
PID:4480 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"115⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE116⤵
- Modifies registry class
PID:216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"117⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE118⤵
- Checks computer location settings
PID:664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"119⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE120⤵
- Modifies registry class
PID:3084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE"121⤵
- System Location Discovery: System Language Discovery
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\3C8953~1.EXE122⤵PID:2148
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-