Overview
overview
10Static
static
10Instagram ....1.exe
windows7-x64
10Instagram ....1.exe
windows10-2004-x64
10Instagram ...gn.dll
windows7-x64
1Instagram ...gn.dll
windows10-2004-x64
1Instagram ...ts.dll
windows7-x64
1Instagram ...ts.dll
windows10-2004-x64
1Instagram ...rk.dll
windows7-x64
1Instagram ...rk.dll
windows10-2004-x64
1Instagram ...ip.dll
windows7-x64
1Instagram ...ip.dll
windows10-2004-x64
1Instagram ...er.exe
windows7-x64
8Instagram ...er.exe
windows10-2004-x64
8Instagram ...gn.dll
windows7-x64
1Instagram ...gn.dll
windows10-2004-x64
1Instagram ...ts.dll
windows7-x64
1Instagram ...ts.dll
windows10-2004-x64
1Instagram ...rk.dll
windows7-x64
1Instagram ...rk.dll
windows10-2004-x64
1Instagram ...et.dll
windows7-x64
1Instagram ...et.dll
windows10-2004-x64
1Instagram ...ml.exe
windows7-x64
10Instagram ...ml.exe
windows10-2004-x64
10Instagram ...et.dll
windows7-x64
1Instagram ...et.dll
windows10-2004-x64
1Analysis
-
max time kernel
123s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-01-2025 17:20
Behavioral task
behavioral1
Sample
Instagram Account Checker By Amir v0.1/Instagram Account Checker By Amir v0.1.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
Instagram Account Checker By Amir v0.1/Instagram Account Checker By Amir v0.1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.Design.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.Design.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral5
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.Fonts.dll
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.Fonts.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral7
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.dll
Resource
win7-20240729-en
Behavioral task
behavioral8
Sample
Instagram Account Checker By Amir v0.1/MetroFramework.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral9
Sample
Instagram Account Checker By Amir v0.1/SHELL/Ionic.Zip.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
Instagram Account Checker By Amir v0.1/SHELL/Ionic.Zip.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral11
Sample
Instagram Account Checker By Amir v0.1/SHELL/Launcher.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Instagram Account Checker By Amir v0.1/SHELL/Launcher.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral13
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.Design.dll
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.Design.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral15
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.Fonts.dll
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.Fonts.dll
Resource
win10v2004-20250129-en
Behavioral task
behavioral17
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
Instagram Account Checker By Amir v0.1/SHELL/MetroFramework.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
Instagram Account Checker By Amir v0.1/SHELL/xNet.dll
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
Instagram Account Checker By Amir v0.1/SHELL/xNet.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Instagram Account Checker By Amir v0.1/SHELL/xml.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
Instagram Account Checker By Amir v0.1/SHELL/xml.exe
Resource
win10v2004-20250129-en
Behavioral task
behavioral23
Sample
Instagram Account Checker By Amir v0.1/xNet.dll
Resource
win7-20240708-en
Behavioral task
behavioral24
Sample
Instagram Account Checker By Amir v0.1/xNet.dll
Resource
win10v2004-20241007-en
General
-
Target
Instagram Account Checker By Amir v0.1/Instagram Account Checker By Amir v0.1.exe
-
Size
214KB
-
MD5
061683b79c9c654a8eb5e81c3b1f4de0
-
SHA1
02cebcbebe06905fc80f1a459a673b8317ebeb80
-
SHA256
19a099135d5248a219e7b13b74b6a608de4db082638dc566d012153406f86c3d
-
SHA512
080d5a29e722dc3e020a7582c592d36f4ccb64b97008df24d5c89b93a2ab4afb3295cf5ec0826ec78c7ef85e5a3d6927038f99a5fcb328b487d216573a42193d
-
SSDEEP
3072:74l6udi2LxmIx72Q78LaN09doHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHHT:766uDtZxj71edik0vNdxNtCcCz
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000600000002024c-49.dat family_neshta behavioral2/files/0x000a000000023ba0-112.dat family_neshta behavioral2/files/0x000600000002025b-205.dat family_neshta behavioral2/files/0x0004000000020337-204.dat family_neshta behavioral2/files/0x00010000000202bd-203.dat family_neshta behavioral2/files/0x0004000000020376-202.dat family_neshta behavioral2/files/0x000100000002155e-210.dat family_neshta behavioral2/files/0x000200000002033b-209.dat family_neshta behavioral2/files/0x0008000000020265-208.dat family_neshta behavioral2/files/0x0006000000020263-207.dat family_neshta behavioral2/files/0x00010000000202d5-201.dat family_neshta behavioral2/files/0x0004000000020364-200.dat family_neshta behavioral2/files/0x00010000000202c2-199.dat family_neshta behavioral2/files/0x0001000000020253-198.dat family_neshta behavioral2/files/0x0004000000020363-197.dat family_neshta behavioral2/files/0x0006000000020240-196.dat family_neshta behavioral2/files/0x0006000000020244-194.dat family_neshta behavioral2/files/0x00070000000202ac-193.dat family_neshta behavioral2/files/0x0004000000020371-192.dat family_neshta behavioral2/files/0x0001000000022602-212.dat family_neshta behavioral2/files/0x0001000000022f8d-223.dat family_neshta behavioral2/files/0x000100000001680b-225.dat family_neshta behavioral2/files/0x00020000000215f6-257.dat family_neshta behavioral2/files/0x0001000000022e93-255.dat family_neshta behavioral2/files/0x0001000000022e8f-254.dat family_neshta behavioral2/files/0x0001000000016979-253.dat family_neshta behavioral2/files/0x000100000001691d-252.dat family_neshta behavioral2/files/0x000100000001692b-251.dat family_neshta behavioral2/files/0x0001000000016922-250.dat family_neshta behavioral2/files/0x000100000001691c-249.dat family_neshta behavioral2/files/0x0001000000016920-248.dat family_neshta behavioral2/files/0x000100000001691e-247.dat family_neshta behavioral2/files/0x000100000001dc20-246.dat family_neshta behavioral2/files/0x000100000001dc1e-245.dat family_neshta behavioral2/files/0x000100000001dc14-244.dat family_neshta behavioral2/files/0x00010000000167f2-242.dat family_neshta behavioral2/files/0x00010000000167f3-241.dat family_neshta behavioral2/files/0x000100000001680e-239.dat family_neshta behavioral2/files/0x000100000001685e-237.dat family_neshta behavioral2/files/0x00010000000167d2-230.dat family_neshta behavioral2/files/0x00010000000167d4-229.dat family_neshta behavioral2/files/0x000200000000072d-256.dat family_neshta behavioral2/files/0x00010000000167b9-226.dat family_neshta behavioral2/files/0x0001000000022f8b-224.dat family_neshta behavioral2/files/0x0001000000022f4c-222.dat family_neshta behavioral2/files/0x0001000000022f4e-218.dat family_neshta behavioral2/files/0x0001000000021508-216.dat family_neshta behavioral2/files/0x0001000000021507-215.dat family_neshta behavioral2/files/0x0001000000022f4f-221.dat family_neshta behavioral2/files/0x0001000000022f8c-220.dat family_neshta behavioral2/files/0x0001000000022f4d-217.dat family_neshta behavioral2/files/0x0001000000021506-214.dat family_neshta behavioral2/memory/4836-259-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/548-267-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4268-273-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3520-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4904-285-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3608-286-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4516-292-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3436-298-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/848-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4200-305-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4776-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3608-317-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 3616 powershell.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation SECURE~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation WINDOW~1.EXE -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Microsoft Startup.lnk Launcher.exe -
Executes dropped EXE 64 IoCs
pid Process 4220 xml.exe 3436 svchost.com 1432 WINDOW~1.EXE 4836 svchost.com 4136 SECURE~1.EXE 548 svchost.com 2348 WINDOW~1.EXE 4268 svchost.com 2024 SECURE~1.EXE 3520 svchost.com 1684 WINDOW~1.EXE 4904 svchost.com 3268 SECURE~1.EXE 4516 svchost.com 1760 WINDOW~1.EXE 848 svchost.com 388 SECURE~1.EXE 4200 svchost.com 1524 WINDOW~1.EXE 4776 svchost.com 4484 SECURE~1.EXE 4520 svchost.com 2688 WINDOW~1.EXE 3524 svchost.com 2344 SECURE~1.EXE 1436 svchost.com 528 WINDOW~1.EXE 2384 svchost.com 2468 SECURE~1.EXE 5080 svchost.com 1988 WINDOW~1.EXE 3360 svchost.com 4572 SECURE~1.EXE 3480 svchost.com 588 WINDOW~1.EXE 3200 svchost.com 1336 SECURE~1.EXE 2872 svchost.com 728 WINDOW~1.EXE 1588 svchost.com 1768 SECURE~1.EXE 692 svchost.com 3436 WINDOW~1.EXE 2496 svchost.com 1100 SECURE~1.EXE 2172 svchost.com 4820 WINDOW~1.EXE 3632 svchost.com 3948 SECURE~1.EXE 5160 svchost.com 5192 WINDOW~1.EXE 5252 svchost.com 5284 SECURE~1.EXE 5344 svchost.com 5376 WINDOW~1.EXE 5440 svchost.com 5472 SECURE~1.EXE 5536 svchost.com 5568 WINDOW~1.EXE 5648 svchost.com 5680 SECURE~1.EXE 5744 svchost.com 5776 WINDOW~1.EXE 5840 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" xml.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Runtime Explorer = "C:\\Windows\\IMF\\\\Windows Services.exe" Launcher.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe xml.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE xml.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe svchost.com File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe xml.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe svchost.com File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE xml.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE xml.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE xml.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE xml.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE xml.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE xml.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE xml.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe xml.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe svchost.com File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE xml.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe svchost.com File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe xml.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE xml.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE xml.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe xml.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe svchost.com File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe svchost.com File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE xml.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE xml.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\IMF\LICENCE.zip Launcher.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 3 IoCs
pid pid_target Process procid_target 4904 4220 WerFault.exe 86 11060 10604 WerFault.exe 404 6276 10864 WerFault.exe 406 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Instagram Account Checker By Amir v0.1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WINDOW~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SECURE~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings SECURE~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings WINDOW~1.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1324 Launcher.exe 3616 powershell.exe 3616 powershell.exe 1432 WINDOW~1.EXE 1432 WINDOW~1.EXE 4136 SECURE~1.EXE 4136 SECURE~1.EXE 2348 WINDOW~1.EXE 2348 WINDOW~1.EXE 2024 SECURE~1.EXE 2024 SECURE~1.EXE 1684 WINDOW~1.EXE 1684 WINDOW~1.EXE 3268 SECURE~1.EXE 3268 SECURE~1.EXE 1760 WINDOW~1.EXE 1760 WINDOW~1.EXE 388 SECURE~1.EXE 388 SECURE~1.EXE 388 SECURE~1.EXE 1524 WINDOW~1.EXE 1524 WINDOW~1.EXE 1524 WINDOW~1.EXE 4484 SECURE~1.EXE 4484 SECURE~1.EXE 4484 SECURE~1.EXE 2688 WINDOW~1.EXE 2688 WINDOW~1.EXE 2688 WINDOW~1.EXE 2344 SECURE~1.EXE 2344 SECURE~1.EXE 2344 SECURE~1.EXE 528 WINDOW~1.EXE 528 WINDOW~1.EXE 528 WINDOW~1.EXE 2468 SECURE~1.EXE 2468 SECURE~1.EXE 2468 SECURE~1.EXE 1988 WINDOW~1.EXE 1988 WINDOW~1.EXE 1988 WINDOW~1.EXE 4572 SECURE~1.EXE 4572 SECURE~1.EXE 4572 SECURE~1.EXE 588 WINDOW~1.EXE 588 WINDOW~1.EXE 588 WINDOW~1.EXE 1336 SECURE~1.EXE 1336 SECURE~1.EXE 1336 SECURE~1.EXE 728 WINDOW~1.EXE 728 WINDOW~1.EXE 728 WINDOW~1.EXE 1768 SECURE~1.EXE 1768 SECURE~1.EXE 1768 SECURE~1.EXE 3436 WINDOW~1.EXE 3436 WINDOW~1.EXE 3436 WINDOW~1.EXE 1100 SECURE~1.EXE 1100 SECURE~1.EXE 1100 SECURE~1.EXE 4820 WINDOW~1.EXE 4820 WINDOW~1.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1324 Launcher.exe Token: SeDebugPrivilege 3616 powershell.exe Token: SeDebugPrivilege 1432 WINDOW~1.EXE Token: SeDebugPrivilege 4136 SECURE~1.EXE Token: SeDebugPrivilege 2348 WINDOW~1.EXE Token: SeDebugPrivilege 2024 SECURE~1.EXE Token: SeDebugPrivilege 1684 WINDOW~1.EXE Token: SeDebugPrivilege 3268 SECURE~1.EXE Token: SeDebugPrivilege 1760 WINDOW~1.EXE Token: SeDebugPrivilege 388 SECURE~1.EXE Token: SeDebugPrivilege 1524 WINDOW~1.EXE Token: SeDebugPrivilege 4484 SECURE~1.EXE Token: SeDebugPrivilege 2688 WINDOW~1.EXE Token: SeDebugPrivilege 2344 SECURE~1.EXE Token: SeDebugPrivilege 528 WINDOW~1.EXE Token: SeDebugPrivilege 2468 SECURE~1.EXE Token: SeDebugPrivilege 1988 WINDOW~1.EXE Token: SeDebugPrivilege 4572 SECURE~1.EXE Token: SeDebugPrivilege 588 WINDOW~1.EXE Token: SeDebugPrivilege 1336 SECURE~1.EXE Token: SeDebugPrivilege 728 WINDOW~1.EXE Token: SeDebugPrivilege 1768 SECURE~1.EXE Token: SeDebugPrivilege 3436 WINDOW~1.EXE Token: SeDebugPrivilege 1100 SECURE~1.EXE Token: SeDebugPrivilege 4820 WINDOW~1.EXE Token: SeDebugPrivilege 3948 SECURE~1.EXE Token: SeDebugPrivilege 5192 WINDOW~1.EXE Token: SeDebugPrivilege 5284 SECURE~1.EXE Token: SeDebugPrivilege 5376 WINDOW~1.EXE Token: SeDebugPrivilege 5472 SECURE~1.EXE Token: SeDebugPrivilege 5568 WINDOW~1.EXE Token: SeDebugPrivilege 5680 SECURE~1.EXE Token: SeDebugPrivilege 5776 WINDOW~1.EXE Token: SeDebugPrivilege 5872 SECURE~1.EXE Token: SeDebugPrivilege 5964 WINDOW~1.EXE Token: SeDebugPrivilege 6060 SECURE~1.EXE Token: SeDebugPrivilege 452 WINDOW~1.EXE Token: SeDebugPrivilege 5356 SECURE~1.EXE Token: SeDebugPrivilege 5560 WINDOW~1.EXE Token: SeDebugPrivilege 5752 SECURE~1.EXE Token: SeDebugPrivilege 2980 WINDOW~1.EXE Token: SeDebugPrivilege 5132 SECURE~1.EXE Token: SeDebugPrivilege 5764 WINDOW~1.EXE Token: SeDebugPrivilege 5260 SECURE~1.EXE Token: SeDebugPrivilege 5316 WINDOW~1.EXE Token: SeDebugPrivilege 6172 SECURE~1.EXE Token: SeDebugPrivilege 6268 WINDOW~1.EXE Token: SeDebugPrivilege 6364 SECURE~1.EXE Token: SeDebugPrivilege 6460 WINDOW~1.EXE Token: SeDebugPrivilege 6552 SECURE~1.EXE Token: SeDebugPrivilege 6648 WINDOW~1.EXE Token: SeDebugPrivilege 6740 SECURE~1.EXE Token: SeDebugPrivilege 6836 WINDOW~1.EXE Token: SeDebugPrivilege 6928 SECURE~1.EXE Token: SeDebugPrivilege 7024 WINDOW~1.EXE Token: SeDebugPrivilege 7120 SECURE~1.EXE Token: SeDebugPrivilege 6248 WINDOW~1.EXE Token: SeDebugPrivilege 6440 SECURE~1.EXE Token: SeDebugPrivilege 6620 WINDOW~1.EXE Token: SeDebugPrivilege 6868 SECURE~1.EXE Token: SeDebugPrivilege 7108 WINDOW~1.EXE Token: SeDebugPrivilege 6336 SECURE~1.EXE Token: SeDebugPrivilege 6936 WINDOW~1.EXE Token: SeDebugPrivilege 6820 SECURE~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3352 wrote to memory of 1324 3352 Instagram Account Checker By Amir v0.1.exe 82 PID 3352 wrote to memory of 1324 3352 Instagram Account Checker By Amir v0.1.exe 82 PID 3352 wrote to memory of 1324 3352 Instagram Account Checker By Amir v0.1.exe 82 PID 1324 wrote to memory of 3616 1324 Launcher.exe 83 PID 1324 wrote to memory of 3616 1324 Launcher.exe 83 PID 1324 wrote to memory of 3616 1324 Launcher.exe 83 PID 3352 wrote to memory of 3608 3352 Instagram Account Checker By Amir v0.1.exe 85 PID 3352 wrote to memory of 3608 3352 Instagram Account Checker By Amir v0.1.exe 85 PID 3352 wrote to memory of 3608 3352 Instagram Account Checker By Amir v0.1.exe 85 PID 3608 wrote to memory of 4220 3608 xml.exe 86 PID 3608 wrote to memory of 4220 3608 xml.exe 86 PID 3608 wrote to memory of 4220 3608 xml.exe 86 PID 1324 wrote to memory of 3436 1324 Launcher.exe 90 PID 1324 wrote to memory of 3436 1324 Launcher.exe 90 PID 1324 wrote to memory of 3436 1324 Launcher.exe 90 PID 3436 wrote to memory of 1432 3436 svchost.com 91 PID 3436 wrote to memory of 1432 3436 svchost.com 91 PID 3436 wrote to memory of 1432 3436 svchost.com 91 PID 1432 wrote to memory of 4836 1432 WINDOW~1.EXE 92 PID 1432 wrote to memory of 4836 1432 WINDOW~1.EXE 92 PID 1432 wrote to memory of 4836 1432 WINDOW~1.EXE 92 PID 4836 wrote to memory of 4136 4836 svchost.com 93 PID 4836 wrote to memory of 4136 4836 svchost.com 93 PID 4836 wrote to memory of 4136 4836 svchost.com 93 PID 4136 wrote to memory of 548 4136 SECURE~1.EXE 94 PID 4136 wrote to memory of 548 4136 SECURE~1.EXE 94 PID 4136 wrote to memory of 548 4136 SECURE~1.EXE 94 PID 548 wrote to memory of 2348 548 svchost.com 95 PID 548 wrote to memory of 2348 548 svchost.com 95 PID 548 wrote to memory of 2348 548 svchost.com 95 PID 2348 wrote to memory of 4268 2348 WINDOW~1.EXE 96 PID 2348 wrote to memory of 4268 2348 WINDOW~1.EXE 96 PID 2348 wrote to memory of 4268 2348 WINDOW~1.EXE 96 PID 4268 wrote to memory of 2024 4268 svchost.com 97 PID 4268 wrote to memory of 2024 4268 svchost.com 97 PID 4268 wrote to memory of 2024 4268 svchost.com 97 PID 2024 wrote to memory of 3520 2024 SECURE~1.EXE 98 PID 2024 wrote to memory of 3520 2024 SECURE~1.EXE 98 PID 2024 wrote to memory of 3520 2024 SECURE~1.EXE 98 PID 3520 wrote to memory of 1684 3520 svchost.com 99 PID 3520 wrote to memory of 1684 3520 svchost.com 99 PID 3520 wrote to memory of 1684 3520 svchost.com 99 PID 1684 wrote to memory of 4904 1684 WINDOW~1.EXE 100 PID 1684 wrote to memory of 4904 1684 WINDOW~1.EXE 100 PID 1684 wrote to memory of 4904 1684 WINDOW~1.EXE 100 PID 4904 wrote to memory of 3268 4904 svchost.com 101 PID 4904 wrote to memory of 3268 4904 svchost.com 101 PID 4904 wrote to memory of 3268 4904 svchost.com 101 PID 3268 wrote to memory of 4516 3268 SECURE~1.EXE 102 PID 3268 wrote to memory of 4516 3268 SECURE~1.EXE 102 PID 3268 wrote to memory of 4516 3268 SECURE~1.EXE 102 PID 4516 wrote to memory of 1760 4516 svchost.com 103 PID 4516 wrote to memory of 1760 4516 svchost.com 103 PID 4516 wrote to memory of 1760 4516 svchost.com 103 PID 1760 wrote to memory of 848 1760 WINDOW~1.EXE 106 PID 1760 wrote to memory of 848 1760 WINDOW~1.EXE 106 PID 1760 wrote to memory of 848 1760 WINDOW~1.EXE 106 PID 848 wrote to memory of 388 848 svchost.com 107 PID 848 wrote to memory of 388 848 svchost.com 107 PID 848 wrote to memory of 388 848 svchost.com 107 PID 388 wrote to memory of 4200 388 SECURE~1.EXE 110 PID 388 wrote to memory of 4200 388 SECURE~1.EXE 110 PID 388 wrote to memory of 4200 388 SECURE~1.EXE 110 PID 4200 wrote to memory of 1524 4200 svchost.com 111
Processes
-
C:\Users\Admin\AppData\Local\Temp\Instagram Account Checker By Amir v0.1\Instagram Account Checker By Amir v0.1.exe"C:\Users\Admin\AppData\Local\Temp\Instagram Account Checker By Amir v0.1\Instagram Account Checker By Amir v0.1.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\Instagram Account Checker By Amir v0.1\SHELL\Launcher.exe"C:\Users\Admin\AppData\Local\Temp\Instagram Account Checker By Amir v0.1\SHELL\Launcher.exe"2⤵
- Drops startup file
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" add-mppreference -exclusionpath C:\Windows\IMF\3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3616
-
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE" {Arguments If Needed}3⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE {Arguments If Needed}4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"15⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4516 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"21⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4776 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"23⤵
- Executes dropped EXE
PID:4520 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE24⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"25⤵
- Executes dropped EXE
PID:3524 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1436 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE28⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2384 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE30⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2468 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5080 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"33⤵
- Executes dropped EXE
PID:3360 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE34⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4572 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"35⤵
- Executes dropped EXE
PID:3480 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE36⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"37⤵
- Executes dropped EXE
PID:3200 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2872 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE40⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"41⤵
- Executes dropped EXE
PID:1588 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"43⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:692 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE44⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"45⤵
- Executes dropped EXE
PID:2496 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE46⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2172 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE48⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4820 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"49⤵
- Executes dropped EXE
PID:3632 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"51⤵
- Executes dropped EXE
PID:5160 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"53⤵
- Executes dropped EXE
PID:5252 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5284 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"55⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5344 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5376 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5440 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE58⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5536 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5648 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5680 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"63⤵
- Executes dropped EXE
PID:5744 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"65⤵
- Executes dropped EXE
PID:5840 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE66⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"67⤵PID:5932
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE68⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"69⤵PID:6028
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE70⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"71⤵PID:6120
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE72⤵
- Suspicious use of AdjustPrivilegeToken
PID:452 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"73⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5272 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE74⤵
- Suspicious use of AdjustPrivilegeToken
PID:5356 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"75⤵PID:5444
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE76⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"77⤵
- Drops file in Windows directory
PID:5608 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE78⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"79⤵PID:5948
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE80⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"81⤵PID:6124
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE82⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"83⤵PID:5540
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE84⤵
- Suspicious use of AdjustPrivilegeToken
PID:5764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"85⤵PID:4444
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE86⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"87⤵PID:3556
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE88⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5316 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"89⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE90⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"91⤵
- Drops file in Windows directory
PID:6236 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE92⤵
- Suspicious use of AdjustPrivilegeToken
PID:6268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"93⤵
- System Location Discovery: System Language Discovery
PID:6332 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE94⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"95⤵
- Drops file in Windows directory
PID:6428 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE96⤵
- Suspicious use of AdjustPrivilegeToken
PID:6460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"97⤵
- Drops file in Windows directory
PID:6520 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE98⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:6552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"99⤵PID:6616
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE100⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"101⤵
- Drops file in Windows directory
PID:6708 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE102⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:6740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"103⤵
- Drops file in Windows directory
PID:6804 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE104⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6836 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"105⤵PID:6896
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE106⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"107⤵PID:6992
-
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE108⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:7024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"109⤵PID:7088
-
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE110⤵
- Suspicious use of AdjustPrivilegeToken
PID:7120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"111⤵
- Drops file in Windows directory
PID:6168 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE112⤵
- Suspicious use of AdjustPrivilegeToken
PID:6248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"113⤵
- Drops file in Windows directory
PID:4708 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE114⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:6440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"115⤵
- Drops file in Windows directory
PID:6400 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE116⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:6620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"117⤵
- Drops file in Windows directory
PID:6816 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE118⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\WINDOW~1.EXE"119⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:7012 -
C:\Windows\IMF\WINDOW~1.EXEC:\Windows\IMF\WINDOW~1.EXE120⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:7108 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Windows\IMF\SECURE~1.EXE"121⤵
- Drops file in Windows directory
PID:6256 -
C:\Windows\IMF\SECURE~1.EXEC:\Windows\IMF\SECURE~1.EXE122⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:6336
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-