Overview
overview
10Static
static
10Instagram ....1.rar
windows11-21h2-x64
10Instagram ....1.exe
windows11-21h2-x64
10Instagram ...gn.dll
windows11-21h2-x64
1Instagram ...ts.dll
windows11-21h2-x64
1Instagram ...rk.dll
windows11-21h2-x64
1Instagram ...ip.dll
windows11-21h2-x64
1Instagram ...CE.zip
windows11-21h2-x64
1Instagram ...er.exe
windows11-21h2-x64
8Instagram ...gn.dll
windows11-21h2-x64
1Instagram ...ts.dll
windows11-21h2-x64
1Instagram ...rk.dll
windows11-21h2-x64
1Instagram ...et.dll
windows11-21h2-x64
1Instagram ...ml.exe
windows11-21h2-x64
10Instagram ...op.ini
windows11-21h2-x64
3Instagram ...an.txt
windows11-21h2-x64
3Instagram ...et.dll
windows11-21h2-x64
1Analysis
-
max time kernel
102s -
max time network
150s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
30-01-2025 17:19
Behavioral task
behavioral1
Sample
Instagram Account Checker By Amir v0.1.rar
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
Instagram Account Checker By Amir v0.1/Instagram Account Checker By Amir v0.1.exe
Resource
win11-20241007-en
Behavioral task
behavioral3
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.Design.dll
Resource
win11-20241007-en
Behavioral task
behavioral4
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.Fonts.dll
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.dll
Resource
win11-20241007-en
Behavioral task
behavioral6
Sample
Instagram Account Checker By Amir v0.1/SHELL/Ionic.Zip.dll
Resource
win11-20241023-en
Behavioral task
behavioral7
Sample
Instagram Account Checker By Amir v0.1/SHELL/LICENCE.zip
Resource
win11-20241007-en
Behavioral task
behavioral8
Sample
Instagram Account Checker By Amir v0.1/SHELL/Launcher.exe
Resource
win11-20241007-en
Behavioral task
behavioral9
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.Design.dll
Resource
win11-20241007-en
Behavioral task
behavioral10
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.Fonts.dll
Resource
win11-20241007-en
Behavioral task
behavioral11
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.dll
Resource
win11-20241007-en
Behavioral task
behavioral12
Sample
Instagram Account Checker By Amir v0.1/SHELL/xNet.dll
Resource
win11-20241007-en
Behavioral task
behavioral13
Sample
Instagram Account Checker By Amir v0.1/SHELL/xml.exe
Resource
win11-20241007-en
Behavioral task
behavioral14
Sample
Instagram Account Checker By Amir v0.1/Virus Total/desktop.ini
Resource
win11-20241007-en
Behavioral task
behavioral15
Sample
Instagram Account Checker By Amir v0.1/Virus Total/scan.txt
Resource
win11-20241007-en
Behavioral task
behavioral16
Sample
Instagram Account Checker By Amir v0.1/xNet.dll
Resource
win11-20241007-en
General
-
Target
Instagram Account Checker By Amir v0.1/Instagram Account Checker By Amir v0.1.exe
-
Size
214KB
-
MD5
061683b79c9c654a8eb5e81c3b1f4de0
-
SHA1
02cebcbebe06905fc80f1a459a673b8317ebeb80
-
SHA256
19a099135d5248a219e7b13b74b6a608de4db082638dc566d012153406f86c3d
-
SHA512
080d5a29e722dc3e020a7582c592d36f4ccb64b97008df24d5c89b93a2ab4afb3295cf5ec0826ec78c7ef85e5a3d6927038f99a5fcb328b487d216573a42193d
-
SSDEEP
3072:74l6udi2LxmIx72Q78LaN09doHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHT:766uDtZxj71edik0vNdxNtCcCz
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000700000002782c-50.dat family_neshta behavioral2/files/0x001a00000002aac4-106.dat family_neshta behavioral2/files/0x0005000000027944-196.dat family_neshta behavioral2/files/0x000700000002783b-201.dat family_neshta behavioral2/files/0x0005000000027917-200.dat family_neshta behavioral2/files/0x000200000002789d-199.dat family_neshta behavioral2/files/0x0005000000027956-198.dat family_neshta behavioral2/files/0x00020000000278b5-197.dat family_neshta behavioral2/files/0x0002000000027833-194.dat family_neshta behavioral2/files/0x0007000000027820-192.dat family_neshta behavioral2/files/0x0007000000027824-190.dat family_neshta behavioral2/files/0x000800000002788c-189.dat family_neshta behavioral2/files/0x0001000000010426-247.dat family_neshta behavioral2/files/0x000100000002a45c-252.dat family_neshta behavioral2/files/0x0002000000028bdb-254.dat family_neshta behavioral2/files/0x000100000002a458-251.dat family_neshta behavioral2/files/0x0003000000026160-257.dat family_neshta behavioral2/files/0x0003000000026109-256.dat family_neshta behavioral2/files/0x0005000000025ecb-255.dat family_neshta behavioral2/files/0x0001000000010444-250.dat family_neshta behavioral2/files/0x0001000000010423-249.dat family_neshta behavioral2/files/0x0001000000010429-248.dat family_neshta behavioral2/files/0x000100000001041d-246.dat family_neshta behavioral2/files/0x0001000000010421-245.dat family_neshta behavioral2/files/0x000100000001041c-244.dat family_neshta behavioral2/files/0x00010000000105b9-243.dat family_neshta behavioral2/memory/3860-266-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000100000001047f-242.dat family_neshta behavioral2/files/0x000100000001048b-241.dat family_neshta behavioral2/files/0x0002000000000681-253.dat family_neshta behavioral2/files/0x00010000000104d5-239.dat family_neshta behavioral2/files/0x0001000000010483-238.dat family_neshta behavioral2/files/0x0001000000010489-236.dat family_neshta behavioral2/files/0x0001000000010627-234.dat family_neshta behavioral2/files/0x000100000001036c-233.dat family_neshta behavioral2/files/0x000100000001034d-232.dat family_neshta behavioral2/files/0x000100000001026b-231.dat family_neshta behavioral2/files/0x0001000000010363-230.dat family_neshta behavioral2/files/0x000100000002a554-229.dat family_neshta behavioral2/files/0x000100000002a556-228.dat family_neshta behavioral2/files/0x000100000002a515-227.dat family_neshta behavioral2/files/0x000100000002a518-226.dat family_neshta behavioral2/files/0x000100000002a555-225.dat family_neshta behavioral2/files/0x000100000002a517-223.dat family_neshta behavioral2/files/0x000100000002a516-222.dat family_neshta behavioral2/files/0x0001000000028aeb-221.dat family_neshta behavioral2/files/0x0001000000028aea-220.dat family_neshta behavioral2/files/0x0001000000028ae9-219.dat family_neshta behavioral2/files/0x0001000000029bda-218.dat family_neshta behavioral2/files/0x0001000000028b3f-217.dat family_neshta behavioral2/files/0x000300000002791b-216.dat family_neshta behavioral2/files/0x0009000000027845-215.dat family_neshta behavioral2/files/0x0007000000027843-214.dat family_neshta behavioral2/files/0x00020000000278a2-195.dat family_neshta behavioral2/files/0x0007000000027942-193.dat family_neshta behavioral2/files/0x0005000000027951-187.dat family_neshta behavioral2/memory/4768-274-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4080-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1352-283-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3616-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4916-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2796-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3708-302-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1588-308-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1940 powershell.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Startup.lnk Launcher.exe -
Executes dropped EXE 64 IoCs
pid Process 3272 xml.exe 4916 svchost.com 3720 WINDOW~1.EXE 3860 svchost.com 4316 SECURE~1.EXE 4768 svchost.com 1048 WINDOW~1.EXE 4080 svchost.com 4756 SECURE~1.EXE 3616 svchost.com 3152 WINDOW~1.EXE 2796 svchost.com 1456 SECURE~1.EXE 3708 svchost.com 3264 WINDOW~1.EXE 1588 svchost.com 2012 SECURE~1.EXE 1376 svchost.com 4236 WINDOW~1.EXE 1536 svchost.com 5088 SECURE~1.EXE 2232 svchost.com 2404 WINDOW~1.EXE 3632 svchost.com 2632 SECURE~1.EXE 472 svchost.com 1388 WINDOW~1.EXE 580 svchost.com 3592 SECURE~1.EXE 3448 svchost.com 1844 WINDOW~1.EXE 4520 svchost.com 4904 SECURE~1.EXE 3404 svchost.com 3168 WINDOW~1.EXE 2680 svchost.com 3992 SECURE~1.EXE 4404 svchost.com 4400 WINDOW~1.EXE 4884 svchost.com 4440 SECURE~1.EXE 5112 svchost.com 1900 WINDOW~1.EXE 4840 svchost.com 768 SECURE~1.EXE 1448 svchost.com 2692 WINDOW~1.EXE 840 svchost.com 5012 SECURE~1.EXE 4996 svchost.com 3120 WINDOW~1.EXE 3648 svchost.com 3960 SECURE~1.EXE 1088 svchost.com 4980 WINDOW~1.EXE 4668 svchost.com 2816 SECURE~1.EXE 2856 svchost.com 3572 WINDOW~1.EXE 4616 svchost.com 4308 SECURE~1.EXE 4448 svchost.com 4876 WINDOW~1.EXE 1836 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" xml.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000\Software\Microsoft\Windows\CurrentVersion\Run\Runtime Explorer = "C:\\Windows\\IMF\\\\Windows Services.exe" Launcher.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\pwahelper.exe xml.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe xml.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateSetup.exe xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe xml.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe svchost.com File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe xml.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe xml.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\msedge_proxy.exe xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe xml.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge_pwa_launcher.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\BHO\ie_to_edge_stub.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateComRegisterShell64.exe xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe xml.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe svchost.com File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateBroker.exe xml.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE xml.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE xml.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge_proxy.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdate.exe xml.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\msedge.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateCore.exe xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\cookie_exporter.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\elevation_service.exe xml.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe xml.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\Application\90.0.818.66\Installer\setup.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EdgeUpdate_bk\1.3.143.57\MicrosoftEdgeUpdateOnDemand.exe xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE xml.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File created C:\Windows\IMF\Secure System Shell.exe.tmp Launcher.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\IMF\Windows Services.exe Launcher.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File created C:\Windows\IMF\LICENCE.dat Launcher.exe File opened for modification C:\Windows\svchost.com svchost.com File created C:\Windows\IMF\Runtime Explorer.exe.tmp Launcher.exe File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2224 3272 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xml.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Instagram Account Checker By Amir v0.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings Launcher.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" xml.exe Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-2584844841-1405471295-1760131749-1000_Classes\Local Settings SECURE~1.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3800 Launcher.exe 1940 powershell.exe 1940 powershell.exe 3720 WINDOW~1.EXE 3720 WINDOW~1.EXE 4316 SECURE~1.EXE 4316 SECURE~1.EXE 1048 WINDOW~1.EXE 1048 WINDOW~1.EXE 4756 SECURE~1.EXE 4756 SECURE~1.EXE 3152 WINDOW~1.EXE 3152 WINDOW~1.EXE 1456 SECURE~1.EXE 1456 SECURE~1.EXE 3264 WINDOW~1.EXE 3264 WINDOW~1.EXE 2012 SECURE~1.EXE 2012 SECURE~1.EXE 4236 WINDOW~1.EXE 4236 WINDOW~1.EXE 5088 SECURE~1.EXE 5088 SECURE~1.EXE 2404 WINDOW~1.EXE 2404 WINDOW~1.EXE 2632 SECURE~1.EXE 2632 SECURE~1.EXE 1388 WINDOW~1.EXE 1388 WINDOW~1.EXE 3592 SECURE~1.EXE 3592 SECURE~1.EXE 3592 SECURE~1.EXE 1844 WINDOW~1.EXE 1844 WINDOW~1.EXE 1844 WINDOW~1.EXE 4904 SECURE~1.EXE 4904 SECURE~1.EXE 4904 SECURE~1.EXE 3168 WINDOW~1.EXE 3168 WINDOW~1.EXE 3168 WINDOW~1.EXE 3992 SECURE~1.EXE 3992 SECURE~1.EXE 3992 SECURE~1.EXE 4400 WINDOW~1.EXE 4400 WINDOW~1.EXE 4400 WINDOW~1.EXE 4440 SECURE~1.EXE 4440 SECURE~1.EXE 4440 SECURE~1.EXE 1900 WINDOW~1.EXE 1900 WINDOW~1.EXE 1900 WINDOW~1.EXE 768 SECURE~1.EXE 768 SECURE~1.EXE 768 SECURE~1.EXE 2692 WINDOW~1.EXE 2692 WINDOW~1.EXE 2692 WINDOW~1.EXE 5012 SECURE~1.EXE 5012 SECURE~1.EXE 5012 SECURE~1.EXE 3120 WINDOW~1.EXE 3120 WINDOW~1.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3800 Launcher.exe Token: SeDebugPrivilege 1940 powershell.exe Token: SeDebugPrivilege 3720 WINDOW~1.EXE Token: SeDebugPrivilege 4316 SECURE~1.EXE Token: SeDebugPrivilege 1048 WINDOW~1.EXE Token: SeDebugPrivilege 4756 SECURE~1.EXE Token: SeDebugPrivilege 3152 WINDOW~1.EXE Token: SeDebugPrivilege 1456 SECURE~1.EXE Token: SeDebugPrivilege 3264 WINDOW~1.EXE Token: SeDebugPrivilege 2012 SECURE~1.EXE Token: SeDebugPrivilege 4236 WINDOW~1.EXE Token: SeDebugPrivilege 5088 SECURE~1.EXE Token: SeDebugPrivilege 2404 WINDOW~1.EXE Token: SeDebugPrivilege 2632 SECURE~1.EXE Token: SeDebugPrivilege 1388 WINDOW~1.EXE Token: SeDebugPrivilege 3592 SECURE~1.EXE Token: SeDebugPrivilege 1844 WINDOW~1.EXE Token: SeDebugPrivilege 4904 SECURE~1.EXE Token: SeDebugPrivilege 3168 WINDOW~1.EXE Token: SeDebugPrivilege 3992 SECURE~1.EXE Token: SeDebugPrivilege 4400 WINDOW~1.EXE Token: SeDebugPrivilege 4440 SECURE~1.EXE Token: SeDebugPrivilege 1900 WINDOW~1.EXE Token: SeDebugPrivilege 768 SECURE~1.EXE Token: SeDebugPrivilege 2692 WINDOW~1.EXE Token: SeDebugPrivilege 5012 SECURE~1.EXE Token: SeDebugPrivilege 3120 WINDOW~1.EXE Token: SeDebugPrivilege 3960 SECURE~1.EXE Token: SeDebugPrivilege 4980 WINDOW~1.EXE Token: SeDebugPrivilege 2816 SECURE~1.EXE Token: SeDebugPrivilege 3572 WINDOW~1.EXE Token: SeDebugPrivilege 4308 SECURE~1.EXE Token: SeDebugPrivilege 4876 WINDOW~1.EXE Token: SeDebugPrivilege 5144 SECURE~1.EXE Token: SeDebugPrivilege 5236 WINDOW~1.EXE Token: SeDebugPrivilege 5332 SECURE~1.EXE Token: SeDebugPrivilege 5424 WINDOW~1.EXE Token: SeDebugPrivilege 5520 SECURE~1.EXE Token: SeDebugPrivilege 5612 WINDOW~1.EXE Token: SeDebugPrivilege 5708 SECURE~1.EXE Token: SeDebugPrivilege 5800 WINDOW~1.EXE Token: SeDebugPrivilege 5896 SECURE~1.EXE Token: SeDebugPrivilege 5988 WINDOW~1.EXE Token: SeDebugPrivilege 6084 SECURE~1.EXE Token: SeDebugPrivilege 5176 WINDOW~1.EXE Token: SeDebugPrivilege 5412 SECURE~1.EXE Token: SeDebugPrivilege 5604 WINDOW~1.EXE Token: SeDebugPrivilege 5784 SECURE~1.EXE Token: SeDebugPrivilege 5980 WINDOW~1.EXE Token: SeDebugPrivilege 5132 SECURE~1.EXE Token: SeDebugPrivilege 5684 WINDOW~1.EXE Token: SeDebugPrivilege 5216 SECURE~1.EXE Token: SeDebugPrivilege 1956 WINDOW~1.EXE Token: SeDebugPrivilege 6240 SECURE~1.EXE Token: SeDebugPrivilege 6332 WINDOW~1.EXE Token: SeDebugPrivilege 6428 SECURE~1.EXE Token: SeDebugPrivilege 6520 WINDOW~1.EXE Token: SeDebugPrivilege 6616 SECURE~1.EXE Token: SeDebugPrivilege 6708 WINDOW~1.EXE Token: SeDebugPrivilege 6800 SECURE~1.EXE Token: SeDebugPrivilege 6896 WINDOW~1.EXE Token: SeDebugPrivilege 6992 SECURE~1.EXE Token: SeDebugPrivilege 7084 WINDOW~1.EXE Token: SeDebugPrivilege 6068 SECURE~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 3800 2268 Instagram Account Checker By Amir v0.1.exe 78 PID 2268 wrote to memory of 3800 2268 Instagram Account Checker By Amir v0.1.exe 78 PID 2268 wrote to memory of 3800 2268 Instagram Account Checker By Amir v0.1.exe 78 PID 3800 wrote to memory of 1940 3800 Launcher.exe 79 PID 3800 wrote to memory of 1940 3800 Launcher.exe 79 PID 3800 wrote to memory of 1940 3800 Launcher.exe 79 PID 2268 wrote to memory of 1352 2268 Instagram Account Checker By Amir v0.1.exe 81 PID 2268 wrote to memory of 1352 2268 Instagram Account Checker By Amir v0.1.exe 81 PID 2268 wrote to memory of 1352 2268 Instagram Account Checker By Amir v0.1.exe 81 PID 1352 wrote to memory of 3272 1352 xml.exe 82 PID 1352 wrote to memory of 3272 1352 xml.exe 82 PID 1352 wrote to memory of 3272 1352 xml.exe 82 PID 3800 wrote to memory of 4916 3800 Launcher.exe 86 PID 3800 wrote to memory of 4916 3800 Launcher.exe 86 PID 3800 wrote to memory of 4916 3800 Launcher.exe 86 PID 4916 wrote to memory of 3720 4916 svchost.com 87 PID 4916 wrote to memory of 3720 4916 svchost.com 87 PID 4916 wrote to memory of 3720 4916 svchost.com 87 PID 3720 wrote to memory of 3860 3720 WINDOW~1.EXE 88 PID 3720 wrote to memory of 3860 3720 WINDOW~1.EXE 88 PID 3720 wrote to memory of 3860 3720 WINDOW~1.EXE 88 PID 3860 wrote to memory of 4316 3860 svchost.com 89 PID 3860 wrote to memory of 4316 3860 svchost.com 89 PID 3860 wrote to memory of 4316 3860 svchost.com 89 PID 4316 wrote to memory of 4768 4316 SECURE~1.EXE 90 PID 4316 wrote to memory of 4768 4316 SECURE~1.EXE 90 PID 4316 wrote to memory of 4768 4316 SECURE~1.EXE 90 PID 4768 wrote to memory of 1048 4768 svchost.com 91 PID 4768 wrote to memory of 1048 4768 svchost.com 91 PID 4768 wrote to memory of 1048 4768 svchost.com 91 PID 1048 wrote to memory of 4080 1048 WINDOW~1.EXE 92 PID 1048 wrote to memory of 4080 1048 WINDOW~1.EXE 92 PID 1048 wrote to memory of 4080 1048 WINDOW~1.EXE 92 PID 4080 wrote to memory of 4756 4080 svchost.com 93 PID 4080 wrote to memory of 4756 4080 svchost.com 93 PID 4080 wrote to memory of 4756 4080 svchost.com 93 PID 4756 wrote to memory of 3616 4756 SECURE~1.EXE 94 PID 4756 wrote to memory of 3616 4756 SECURE~1.EXE 94 PID 4756 wrote to memory of 3616 4756 SECURE~1.EXE 94 PID 3616 wrote to memory of 3152 3616 svchost.com 95 PID 3616 wrote to memory of 3152 3616 svchost.com 95 PID 3616 wrote to memory of 3152 3616 svchost.com 95 PID 3152 wrote to memory of 2796 3152 WINDOW~1.EXE 96 PID 3152 wrote to memory of 2796 3152 WINDOW~1.EXE 96 PID 3152 wrote to memory of 2796 3152 WINDOW~1.EXE 96 PID 2796 wrote to memory of 1456 2796 svchost.com 97 PID 2796 wrote to memory of 1456 2796 svchost.com 97 PID 2796 wrote to memory of 1456 2796 svchost.com 97 PID 1456 wrote to memory of 3708 1456 SECURE~1.EXE 98 PID 1456 wrote to memory of 3708 1456 SECURE~1.EXE 98 PID 1456 wrote to memory of 3708 1456 SECURE~1.EXE 98 PID 3708 wrote to memory of 3264 3708 svchost.com 99 PID 3708 wrote to memory of 3264 3708 svchost.com 99 PID 3708 wrote to memory of 3264 3708 svchost.com 99 PID 3264 wrote to memory of 1588 3264 WINDOW~1.EXE 100 PID 3264 wrote to memory of 1588 3264 WINDOW~1.EXE 100 PID 3264 wrote to memory of 1588 3264 WINDOW~1.EXE 100 PID 1588 wrote to memory of 2012 1588 svchost.com 101 PID 1588 wrote to memory of 2012 1588 svchost.com 101 PID 1588 wrote to memory of 2012 1588 svchost.com 101 PID 2012 wrote to memory of 1376 2012 SECURE~1.EXE 102 PID 2012 wrote to memory of 1376 2012 SECURE~1.EXE 102 PID 2012 wrote to memory of 1376 2012 SECURE~1.EXE 102 PID 1376 wrote to memory of 4236 1376 svchost.com 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\Instagram Account Checker By Amir v0.1\Instagram Account Checker By Amir v0.1.exe"C:\Users\Admin\AppData\Local\Temp\Instagram Account Checker By Amir v0.1\Instagram Account Checker By Amir v0.1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\Instagram Account Checker By Amir v0.1\SHELL\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Instagram Account Checker By Amir v0.1\SHELL\Launcher.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath C:\Windows\IMF\3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE" {Arguments If Needed}3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE {Arguments If Needed}4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3860 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4080 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE14⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"17⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE20⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"21⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE22⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"23⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE24⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"25⤵
- Executes dropped EXE
PID:3632 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE26⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:472 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE28⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"29⤵
- Executes dropped EXE
PID:580 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE30⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"31⤵
- Executes dropped EXE
PID:3448 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE32⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"33⤵
- Executes dropped EXE
PID:4520 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE34⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"35⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3404 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE36⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3168 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE38⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4404 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE40⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"41⤵
- Executes dropped EXE
PID:4884 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"43⤵
- Executes dropped EXE
PID:5112 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"45⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4840 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"47⤵
- Executes dropped EXE
PID:1448 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:840 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE50⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4996 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"53⤵
- Executes dropped EXE
PID:3648 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"55⤵
- Executes dropped EXE
PID:1088 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"57⤵
- Executes dropped EXE
PID:4668 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"59⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2856 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4616 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4448 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1836 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE66⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5144 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:5204 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE68⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"69⤵
- Drops file in Windows directory
PID:5300 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE70⤵
- Suspicious use of AdjustPrivilegeToken
PID:5332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"71⤵
- System Location Discovery: System Language Discovery
PID:5392 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE72⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5424 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"73⤵
- Drops file in Windows directory
PID:5488 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE74⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"75⤵PID:5580
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE76⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"77⤵
- Drops file in Windows directory
PID:5676 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE78⤵
- Suspicious use of AdjustPrivilegeToken
PID:5708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"79⤵
- Drops file in Windows directory
PID:5768 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE80⤵
- Suspicious use of AdjustPrivilegeToken
PID:5800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"81⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5864 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE82⤵
- Suspicious use of AdjustPrivilegeToken
PID:5896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:5956 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE84⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"85⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6052 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE86⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"87⤵PID:5124
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE88⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5176 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"89⤵PID:5328
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE90⤵
- Suspicious use of AdjustPrivilegeToken
PID:5412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"91⤵PID:5492
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE92⤵
- Suspicious use of AdjustPrivilegeToken
PID:5604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"93⤵
- Drops file in Windows directory
PID:5704 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE94⤵
- Suspicious use of AdjustPrivilegeToken
PID:5784 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"95⤵
- Drops file in Windows directory
PID:5868 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE96⤵
- Suspicious use of AdjustPrivilegeToken
PID:5980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"97⤵
- System Location Discovery: System Language Discovery
PID:6016 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE98⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"99⤵PID:5460
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE100⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"101⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5960 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE102⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"103⤵
- Drops file in Windows directory
PID:5152 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE104⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"105⤵
- Drops file in Windows directory
PID:6208 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE106⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"107⤵PID:6300
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE108⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"109⤵PID:6396
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE110⤵
- Suspicious use of AdjustPrivilegeToken
PID:6428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"111⤵PID:6488
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE112⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6520 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"113⤵PID:6584
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE114⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"115⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:6676 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE116⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6708 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"117⤵PID:6768
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE118⤵
- Suspicious use of AdjustPrivilegeToken
PID:6800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"119⤵
- System Location Discovery: System Language Discovery
PID:6864 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE120⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"121⤵PID:6960
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE122⤵
- Suspicious use of AdjustPrivilegeToken
PID:6992
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-