Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
10Instagram ....1.rar
windows11-21h2-x64
10Instagram ....1.exe
windows11-21h2-x64
10Instagram ...gn.dll
windows11-21h2-x64
1Instagram ...ts.dll
windows11-21h2-x64
1Instagram ...rk.dll
windows11-21h2-x64
1Instagram ...ip.dll
windows11-21h2-x64
1Instagram ...CE.zip
windows11-21h2-x64
1Instagram ...er.exe
windows11-21h2-x64
8Instagram ...gn.dll
windows11-21h2-x64
1Instagram ...ts.dll
windows11-21h2-x64
1Instagram ...rk.dll
windows11-21h2-x64
1Instagram ...et.dll
windows11-21h2-x64
1Instagram ...ml.exe
windows11-21h2-x64
10Instagram ...op.ini
windows11-21h2-x64
3Instagram ...an.txt
windows11-21h2-x64
3Instagram ...et.dll
windows11-21h2-x64
1Analysis
-
max time kernel
106s -
max time network
154s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
30/01/2025, 17:19
Behavioral task
behavioral1
Sample
Instagram Account Checker By Amir v0.1.rar
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Instagram Account Checker By Amir v0.1/Instagram Account Checker By Amir v0.1.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.Design.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.Fonts.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Instagram Account Checker By Amir v0.1/SHELL/Ionic.Zip.dll
Resource
win11-20241023-en
Behavioral task
behavioral7
Sample
Instagram Account Checker By Amir v0.1/SHELL/LICENCE.zip
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Instagram Account Checker By Amir v0.1/SHELL/Launcher.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.Design.dll
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.Fonts.dll
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.dll
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
Instagram Account Checker By Amir v0.1/SHELL/xNet.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
Instagram Account Checker By Amir v0.1/SHELL/xml.exe
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
Instagram Account Checker By Amir v0.1/Virus Total/desktop.ini
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
Instagram Account Checker By Amir v0.1/Virus Total/scan.txt
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
Instagram Account Checker By Amir v0.1/xNet.dll
Resource
win11-20241007-en
General
-
Target
Instagram Account Checker By Amir v0.1.rar
-
Size
1.3MB
-
MD5
a881a88cc642bac36123ee7ab3ce377d
-
SHA1
d9a33f01390f6a86eebab66201db22b1d4e92684
-
SHA256
418d91aa65e3ab38c3c95015d986684ee9c7bcb326f186ad0fba5c12dc77e8bc
-
SHA512
852be83f0a19f368d7e0051fc4663ecfc5f1ae5fddbeca31027ce8eafe4acdd7808f9b3203d8a78c0c3b6b485231e07fef1ea0386f1b5bded4444d1d556bb9bb
-
SSDEEP
24576:Gp7XinQiXwC6KsZ+RMwuMzp/o1ZybvIk05+He1FSb4pGXsZ2+GE+oTd/N:u7IdXwkHR1uM9Q3IvIB5+He1FSb4C22G
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral1/files/0x001c00000002ab60-60.dat family_neshta behavioral1/files/0x0008000000027894-105.dat family_neshta behavioral1/files/0x001900000002ab71-142.dat family_neshta behavioral1/files/0x000700000002782c-234.dat family_neshta behavioral1/files/0x0005000000027959-232.dat family_neshta behavioral1/files/0x0007000000027843-245.dat family_neshta behavioral1/files/0x000500000002791f-244.dat family_neshta behavioral1/files/0x00020000000278a5-243.dat family_neshta behavioral1/files/0x000500000002795e-242.dat family_neshta behavioral1/files/0x00020000000278bd-241.dat family_neshta behavioral1/files/0x000500000002794c-240.dat family_neshta behavioral1/files/0x00020000000278aa-239.dat family_neshta behavioral1/files/0x000700000002784b-250.dat family_neshta behavioral1/files/0x000100000002a522-262.dat family_neshta behavioral1/files/0x00010000000105b7-276.dat family_neshta behavioral1/files/0x000100000001036b-269.dat family_neshta behavioral1/files/0x0001000000010425-283.dat family_neshta behavioral1/files/0x000100000001041c-282.dat family_neshta behavioral1/files/0x0001000000010420-281.dat family_neshta behavioral1/files/0x000100000001041b-280.dat family_neshta behavioral1/files/0x000100000001047e-278.dat family_neshta behavioral1/files/0x000100000001048a-277.dat family_neshta behavioral1/files/0x0001000000029be2-254.dat family_neshta behavioral1/files/0x00010000000104d4-275.dat family_neshta behavioral1/files/0x0001000000010482-274.dat family_neshta behavioral1/files/0x0001000000010488-272.dat family_neshta behavioral1/files/0x0001000000010626-270.dat family_neshta behavioral1/files/0x000100000001034c-268.dat family_neshta behavioral1/files/0x000100000001026a-267.dat family_neshta behavioral1/files/0x0001000000010362-266.dat family_neshta behavioral1/files/0x000100000002a55e-265.dat family_neshta behavioral1/files/0x000100000002a560-264.dat family_neshta behavioral1/files/0x000100000002a51f-263.dat family_neshta behavioral1/files/0x000100000002a55f-261.dat family_neshta behavioral1/files/0x000100000002a521-259.dat family_neshta behavioral1/files/0x000100000002a520-258.dat family_neshta behavioral1/files/0x0001000000028af2-257.dat family_neshta behavioral1/files/0x0001000000028af1-256.dat family_neshta behavioral1/files/0x0001000000028af0-255.dat family_neshta behavioral1/files/0x0001000000028b46-253.dat family_neshta behavioral1/files/0x0003000000027923-252.dat family_neshta behavioral1/files/0x000900000002784d-251.dat family_neshta behavioral1/files/0x000200000002783b-238.dat family_neshta behavioral1/files/0x000500000002794b-237.dat family_neshta behavioral1/files/0x0007000000027828-236.dat family_neshta behavioral1/files/0x0007000000027834-235.dat family_neshta behavioral1/memory/3312-292-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3964-302-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2068-310-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3412-316-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1952-317-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2644-323-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2184-329-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2868-330-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2468-336-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1432-342-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1680-348-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1916-354-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1988-360-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1372-366-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/3412-367-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/1584-373-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/2184-379-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral1/memory/772-380-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 5068 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Startup.lnk Launcher.exe -
Executes dropped EXE 64 IoCs
pid Process 4744 Instagram Account Checker By Amir v0.1.exe 4408 Launcher.exe 3412 xml.exe 1204 xml.exe 2184 svchost.com 2968 WINDOW~1.EXE 3312 svchost.com 836 SECURE~1.EXE 3964 svchost.com 1724 WINDOW~1.EXE 2068 svchost.com 1412 SECURE~1.EXE 1952 svchost.com 1660 WINDOW~1.EXE 2644 svchost.com 4380 SECURE~1.EXE 2868 svchost.com 1792 WINDOW~1.EXE 2468 svchost.com 1080 SECURE~1.EXE 1432 svchost.com 2448 WINDOW~1.EXE 1680 svchost.com 4912 SECURE~1.EXE 1916 svchost.com 4848 WINDOW~1.EXE 1988 svchost.com 4624 SECURE~1.EXE 1372 svchost.com 4740 WINDOW~1.EXE 1584 svchost.com 1008 SECURE~1.EXE 772 svchost.com 1880 WINDOW~1.EXE 2956 svchost.com 2952 SECURE~1.EXE 908 svchost.com 1960 WINDOW~1.EXE 688 svchost.com 2712 SECURE~1.EXE 3388 svchost.com 4924 WINDOW~1.EXE 1488 svchost.com 5032 SECURE~1.EXE 3796 svchost.com 1252 WINDOW~1.EXE 4612 svchost.com 3804 SECURE~1.EXE 4976 svchost.com 3504 WINDOW~1.EXE 3392 svchost.com 4092 SECURE~1.EXE 2880 svchost.com 4880 WINDOW~1.EXE 1020 svchost.com 1556 SECURE~1.EXE 1204 svchost.com 3044 WINDOW~1.EXE 4680 svchost.com 3652 SECURE~1.EXE 1140 svchost.com 2184 WINDOW~1.EXE 1884 svchost.com 4048 SECURE~1.EXE -
Loads dropped DLL 2 IoCs
pid Process 4408 Launcher.exe 4408 Launcher.exe -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" xml.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000\Software\Microsoft\Windows\CurrentVersion\Run\Runtime Explorer = "C:\\Windows\\IMF\\\\Windows Services.exe" Launcher.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\Desktop\Virus Total\desktop.ini 7zFM.exe File opened for modification C:\Users\Admin\Desktop\Virus Total\desktop.ini 7zFM.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe xml.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE xml.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE xml.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateOnDemand.exe xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe xml.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\msedge_proxy.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateCore.exe xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe xml.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge_proxy.exe xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE xml.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe xml.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE xml.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge_pwa_launcher.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateSetup.exe xml.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateBroker.exe xml.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\Installer\setup.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\identity_helper.exe xml.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE xml.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedgewebview2.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\msedge.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\pwahelper.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeComRegisterShellARM64.exe xml.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\BHO\ie_to_edge_stub.exe xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\elevation_service.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\pwahelper.exe xml.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe svchost.com -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File created C:\Windows\IMF\Windows Services.exe.tmp Launcher.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File created C:\Windows\IMF\Secure System Shell.exe.tmp Launcher.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com xml.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1608 1204 WerFault.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ 7zFM.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings Launcher.exe Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-556537508-2730415644-482548075-1000_Classes\Local Settings SECURE~1.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4408 Launcher.exe 5068 powershell.exe 5068 powershell.exe 2968 WINDOW~1.EXE 2968 WINDOW~1.EXE 836 SECURE~1.EXE 836 SECURE~1.EXE 1724 WINDOW~1.EXE 1724 WINDOW~1.EXE 1412 SECURE~1.EXE 1412 SECURE~1.EXE 1660 WINDOW~1.EXE 1660 WINDOW~1.EXE 4380 SECURE~1.EXE 4380 SECURE~1.EXE 1792 WINDOW~1.EXE 1792 WINDOW~1.EXE 1080 SECURE~1.EXE 1080 SECURE~1.EXE 2448 WINDOW~1.EXE 2448 WINDOW~1.EXE 4912 SECURE~1.EXE 4912 SECURE~1.EXE 4848 WINDOW~1.EXE 4848 WINDOW~1.EXE 4624 SECURE~1.EXE 4624 SECURE~1.EXE 4740 WINDOW~1.EXE 4740 WINDOW~1.EXE 1008 SECURE~1.EXE 1008 SECURE~1.EXE 1008 SECURE~1.EXE 1880 WINDOW~1.EXE 1880 WINDOW~1.EXE 1880 WINDOW~1.EXE 2952 SECURE~1.EXE 2952 SECURE~1.EXE 2952 SECURE~1.EXE 1960 WINDOW~1.EXE 1960 WINDOW~1.EXE 1960 WINDOW~1.EXE 2712 SECURE~1.EXE 2712 SECURE~1.EXE 2712 SECURE~1.EXE 4924 WINDOW~1.EXE 4924 WINDOW~1.EXE 4924 WINDOW~1.EXE 5032 SECURE~1.EXE 5032 SECURE~1.EXE 5032 SECURE~1.EXE 1252 WINDOW~1.EXE 1252 WINDOW~1.EXE 1252 WINDOW~1.EXE 3804 SECURE~1.EXE 3804 SECURE~1.EXE 3804 SECURE~1.EXE 3504 WINDOW~1.EXE 3504 WINDOW~1.EXE 3504 WINDOW~1.EXE 4092 SECURE~1.EXE 4092 SECURE~1.EXE 4092 SECURE~1.EXE 4880 WINDOW~1.EXE 4880 WINDOW~1.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1440 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeRestorePrivilege 1440 7zFM.exe Token: 35 1440 7zFM.exe Token: SeSecurityPrivilege 1440 7zFM.exe Token: SeDebugPrivilege 4408 Launcher.exe Token: SeDebugPrivilege 5068 powershell.exe Token: SeDebugPrivilege 2968 WINDOW~1.EXE Token: SeDebugPrivilege 836 SECURE~1.EXE Token: SeDebugPrivilege 1724 WINDOW~1.EXE Token: SeDebugPrivilege 1412 SECURE~1.EXE Token: SeDebugPrivilege 1660 WINDOW~1.EXE Token: SeDebugPrivilege 4380 SECURE~1.EXE Token: SeDebugPrivilege 1792 WINDOW~1.EXE Token: SeDebugPrivilege 1080 SECURE~1.EXE Token: SeDebugPrivilege 2448 WINDOW~1.EXE Token: SeDebugPrivilege 4912 SECURE~1.EXE Token: SeDebugPrivilege 4848 WINDOW~1.EXE Token: SeDebugPrivilege 4624 SECURE~1.EXE Token: SeDebugPrivilege 4740 WINDOW~1.EXE Token: SeDebugPrivilege 1008 SECURE~1.EXE Token: SeDebugPrivilege 1880 WINDOW~1.EXE Token: SeDebugPrivilege 2952 SECURE~1.EXE Token: SeDebugPrivilege 1960 WINDOW~1.EXE Token: SeDebugPrivilege 2712 SECURE~1.EXE Token: SeDebugPrivilege 4924 WINDOW~1.EXE Token: SeDebugPrivilege 5032 SECURE~1.EXE Token: SeDebugPrivilege 1252 WINDOW~1.EXE Token: SeDebugPrivilege 3804 SECURE~1.EXE Token: SeDebugPrivilege 3504 WINDOW~1.EXE Token: SeDebugPrivilege 4092 SECURE~1.EXE Token: SeDebugPrivilege 4880 WINDOW~1.EXE Token: SeDebugPrivilege 1556 SECURE~1.EXE Token: SeDebugPrivilege 3044 WINDOW~1.EXE Token: SeDebugPrivilege 3652 SECURE~1.EXE Token: SeDebugPrivilege 2184 WINDOW~1.EXE Token: SeDebugPrivilege 4048 SECURE~1.EXE Token: SeDebugPrivilege 4068 WINDOW~1.EXE Token: SeDebugPrivilege 5148 SECURE~1.EXE Token: SeDebugPrivilege 5240 WINDOW~1.EXE Token: SeDebugPrivilege 5332 SECURE~1.EXE Token: SeDebugPrivilege 5424 WINDOW~1.EXE Token: SeDebugPrivilege 5516 SECURE~1.EXE Token: SeDebugPrivilege 5608 WINDOW~1.EXE Token: SeDebugPrivilege 5700 SECURE~1.EXE Token: SeDebugPrivilege 5792 WINDOW~1.EXE Token: SeDebugPrivilege 5884 SECURE~1.EXE Token: SeDebugPrivilege 5976 WINDOW~1.EXE Token: SeDebugPrivilege 6068 SECURE~1.EXE Token: SeDebugPrivilege 5144 WINDOW~1.EXE Token: SeDebugPrivilege 5364 SECURE~1.EXE Token: SeDebugPrivilege 5600 WINDOW~1.EXE Token: SeDebugPrivilege 5768 SECURE~1.EXE Token: SeDebugPrivilege 6056 WINDOW~1.EXE Token: SeDebugPrivilege 5308 SECURE~1.EXE Token: SeDebugPrivilege 5856 WINDOW~1.EXE Token: SeDebugPrivilege 5772 SECURE~1.EXE Token: SeDebugPrivilege 6172 WINDOW~1.EXE Token: SeDebugPrivilege 6264 SECURE~1.EXE Token: SeDebugPrivilege 6356 WINDOW~1.EXE Token: SeDebugPrivilege 6452 SECURE~1.EXE Token: SeDebugPrivilege 6544 WINDOW~1.EXE Token: SeDebugPrivilege 6636 SECURE~1.EXE Token: SeDebugPrivilege 6728 WINDOW~1.EXE Token: SeDebugPrivilege 6824 SECURE~1.EXE Token: SeDebugPrivilege 6916 WINDOW~1.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 1440 7zFM.exe 1440 7zFM.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4744 wrote to memory of 4408 4744 Instagram Account Checker By Amir v0.1.exe 82 PID 4744 wrote to memory of 4408 4744 Instagram Account Checker By Amir v0.1.exe 82 PID 4744 wrote to memory of 4408 4744 Instagram Account Checker By Amir v0.1.exe 82 PID 4408 wrote to memory of 5068 4408 Launcher.exe 83 PID 4408 wrote to memory of 5068 4408 Launcher.exe 83 PID 4408 wrote to memory of 5068 4408 Launcher.exe 83 PID 4744 wrote to memory of 3412 4744 Instagram Account Checker By Amir v0.1.exe 85 PID 4744 wrote to memory of 3412 4744 Instagram Account Checker By Amir v0.1.exe 85 PID 4744 wrote to memory of 3412 4744 Instagram Account Checker By Amir v0.1.exe 85 PID 3412 wrote to memory of 1204 3412 xml.exe 86 PID 3412 wrote to memory of 1204 3412 xml.exe 86 PID 3412 wrote to memory of 1204 3412 xml.exe 86 PID 4408 wrote to memory of 2184 4408 Launcher.exe 90 PID 4408 wrote to memory of 2184 4408 Launcher.exe 90 PID 4408 wrote to memory of 2184 4408 Launcher.exe 90 PID 2184 wrote to memory of 2968 2184 svchost.com 91 PID 2184 wrote to memory of 2968 2184 svchost.com 91 PID 2184 wrote to memory of 2968 2184 svchost.com 91 PID 2968 wrote to memory of 3312 2968 WINDOW~1.EXE 92 PID 2968 wrote to memory of 3312 2968 WINDOW~1.EXE 92 PID 2968 wrote to memory of 3312 2968 WINDOW~1.EXE 92 PID 3312 wrote to memory of 836 3312 svchost.com 93 PID 3312 wrote to memory of 836 3312 svchost.com 93 PID 3312 wrote to memory of 836 3312 svchost.com 93 PID 836 wrote to memory of 3964 836 SECURE~1.EXE 95 PID 836 wrote to memory of 3964 836 SECURE~1.EXE 95 PID 836 wrote to memory of 3964 836 SECURE~1.EXE 95 PID 3964 wrote to memory of 1724 3964 svchost.com 96 PID 3964 wrote to memory of 1724 3964 svchost.com 96 PID 3964 wrote to memory of 1724 3964 svchost.com 96 PID 1724 wrote to memory of 2068 1724 WINDOW~1.EXE 97 PID 1724 wrote to memory of 2068 1724 WINDOW~1.EXE 97 PID 1724 wrote to memory of 2068 1724 WINDOW~1.EXE 97 PID 2068 wrote to memory of 1412 2068 svchost.com 98 PID 2068 wrote to memory of 1412 2068 svchost.com 98 PID 2068 wrote to memory of 1412 2068 svchost.com 98 PID 1412 wrote to memory of 1952 1412 SECURE~1.EXE 99 PID 1412 wrote to memory of 1952 1412 SECURE~1.EXE 99 PID 1412 wrote to memory of 1952 1412 SECURE~1.EXE 99 PID 1952 wrote to memory of 1660 1952 svchost.com 100 PID 1952 wrote to memory of 1660 1952 svchost.com 100 PID 1952 wrote to memory of 1660 1952 svchost.com 100 PID 1660 wrote to memory of 2644 1660 WINDOW~1.EXE 101 PID 1660 wrote to memory of 2644 1660 WINDOW~1.EXE 101 PID 1660 wrote to memory of 2644 1660 WINDOW~1.EXE 101 PID 2644 wrote to memory of 4380 2644 svchost.com 102 PID 2644 wrote to memory of 4380 2644 svchost.com 102 PID 2644 wrote to memory of 4380 2644 svchost.com 102 PID 4380 wrote to memory of 2868 4380 SECURE~1.EXE 103 PID 4380 wrote to memory of 2868 4380 SECURE~1.EXE 103 PID 4380 wrote to memory of 2868 4380 SECURE~1.EXE 103 PID 2868 wrote to memory of 1792 2868 svchost.com 104 PID 2868 wrote to memory of 1792 2868 svchost.com 104 PID 2868 wrote to memory of 1792 2868 svchost.com 104 PID 1792 wrote to memory of 2468 1792 WINDOW~1.EXE 105 PID 1792 wrote to memory of 2468 1792 WINDOW~1.EXE 105 PID 1792 wrote to memory of 2468 1792 WINDOW~1.EXE 105 PID 2468 wrote to memory of 1080 2468 svchost.com 106 PID 2468 wrote to memory of 1080 2468 svchost.com 106 PID 2468 wrote to memory of 1080 2468 svchost.com 106 PID 1080 wrote to memory of 1432 1080 SECURE~1.EXE 107 PID 1080 wrote to memory of 1432 1080 SECURE~1.EXE 107 PID 1080 wrote to memory of 1432 1080 SECURE~1.EXE 107 PID 1432 wrote to memory of 2448 1432 svchost.com 108
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Instagram Account Checker By Amir v0.1.rar"1⤵
- Drops desktop.ini file(s)
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1440
-
C:\Users\Admin\Desktop\Instagram Account Checker By Amir v0.1.exe"C:\Users\Admin\Desktop\Instagram Account Checker By Amir v0.1.exe"1⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\Desktop\SHELL\Launcher.exe"C:\Users\Admin\Desktop\SHELL\Launcher.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4408 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath C:\Windows\IMF\3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5068
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE" {Arguments If Needed}3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE {Arguments If Needed}4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3312 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3964 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"11⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"19⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"21⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1680 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"23⤵
- Executes dropped EXE
PID:1916 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"25⤵
- Executes dropped EXE
PID:1988 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4624 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1372 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"29⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1584 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1008 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:772 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE32⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2956 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE34⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"35⤵
- Executes dropped EXE
PID:908 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE36⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"37⤵
- Executes dropped EXE
PID:688 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE38⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"39⤵
- Executes dropped EXE
PID:3388 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE40⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1488 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE42⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"43⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3796 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4612 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4976 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE48⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"49⤵
- Executes dropped EXE
PID:3392 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE50⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"51⤵
- Executes dropped EXE
PID:2880 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE52⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"53⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1020 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE54⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"55⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1204 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4680 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"59⤵
- Executes dropped EXE
PID:1140 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"61⤵
- Executes dropped EXE
PID:1884 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE62⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"63⤵PID:1396
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE64⤵
- Suspicious use of AdjustPrivilegeToken
PID:4068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"65⤵PID:1084
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE66⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5148 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"67⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5208 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE68⤵
- Suspicious use of AdjustPrivilegeToken
PID:5240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"69⤵
- Drops file in Windows directory
PID:5300 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE70⤵
- Suspicious use of AdjustPrivilegeToken
PID:5332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"71⤵PID:5392
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE72⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5424 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"73⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5484 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE74⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"75⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5576 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE76⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"77⤵PID:5668
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE78⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"79⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5760 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE80⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5792 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"81⤵PID:5852
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE82⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:5944 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE84⤵
- Suspicious use of AdjustPrivilegeToken
PID:5976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"85⤵
- System Location Discovery: System Language Discovery
PID:6036 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE86⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"87⤵PID:6128
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE88⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5144 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"89⤵
- System Location Discovery: System Language Discovery
PID:5312 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE90⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"91⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5512 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE92⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5600 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"93⤵
- Drops file in Windows directory
PID:5732 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE94⤵
- Suspicious use of AdjustPrivilegeToken
PID:5768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"95⤵
- Drops file in Windows directory
PID:5968 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE96⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"97⤵PID:5156
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE98⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:5780 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE100⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"101⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5340 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE102⤵
- Suspicious use of AdjustPrivilegeToken
PID:5772 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"103⤵PID:5408
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE104⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"105⤵PID:6232
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE106⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"107⤵PID:6324
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE108⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6356 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"109⤵
- Drops file in Windows directory
PID:6420 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE110⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"111⤵PID:6512
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE112⤵
- Suspicious use of AdjustPrivilegeToken
PID:6544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"113⤵
- Drops file in Windows directory
PID:6604 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE114⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"115⤵
- Drops file in Windows directory
PID:6696 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE116⤵
- Suspicious use of AdjustPrivilegeToken
PID:6728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"117⤵PID:6792
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE118⤵
- Suspicious use of AdjustPrivilegeToken
PID:6824 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"119⤵
- Drops file in Windows directory
PID:6884 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE120⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6916 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"121⤵
- Drops file in Windows directory
PID:6976 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE122⤵
- Modifies registry class
PID:7008
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-