Analysis
-
max time kernel
48s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
01-02-2025 22:03
Behavioral task
behavioral1
Sample
749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe
Resource
win10v2004-20250129-en
General
-
Target
749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe
-
Size
3.3MB
-
MD5
406a35fca4ea0e718ece9de3e2870e20
-
SHA1
73258871f81452b529ae0748f28abbd1fa061ac3
-
SHA256
749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0e
-
SHA512
b7dd2d320b3d817384b5b1fbe236dcda5493cd6a84f311757b8392d846e052102835c686939a728065250ddedfa2aca4ed132110186966538bc2adedc052a68e
-
SSDEEP
49152:oGGDw/cCL2a3j7+kt2y9d/UdMTJVDOZ6LrS0JZE0wb9sMnm:f/2y0ENanm
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0008000000023c4c-4.dat family_neshta behavioral2/files/0x0007000000023c4d-11.dat family_neshta behavioral2/memory/3152-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/444-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/624-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3492-39-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4712-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1432-51-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2916-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4900-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2192-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1868-74-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4984-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5096-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00060000000201ea-92.dat family_neshta behavioral2/files/0x0004000000020309-96.dat family_neshta behavioral2/files/0x00010000000201f9-98.dat family_neshta behavioral2/files/0x000400000002031c-109.dat family_neshta behavioral2/files/0x0006000000020201-112.dat family_neshta behavioral2/memory/1208-124-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4816-113-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00040000000202dd-111.dat family_neshta behavioral2/files/0x0001000000020263-110.dat family_neshta behavioral2/files/0x000100000002027b-105.dat family_neshta behavioral2/files/0x000400000002030a-104.dat family_neshta behavioral2/files/0x00010000000214ab-133.dat family_neshta behavioral2/files/0x00010000000214ad-140.dat family_neshta behavioral2/files/0x00010000000214ac-139.dat family_neshta behavioral2/files/0x0001000000022f04-144.dat family_neshta behavioral2/files/0x0001000000022f41-155.dat family_neshta behavioral2/files/0x0001000000022f02-150.dat family_neshta behavioral2/files/0x00010000000167ac-159.dat family_neshta behavioral2/files/0x00010000000167fe-157.dat family_neshta behavioral2/files/0x000100000001dbc1-174.dat family_neshta behavioral2/files/0x0001000000016913-187.dat family_neshta behavioral2/files/0x0001000000022f05-149.dat family_neshta behavioral2/files/0x000200000002159f-195.dat family_neshta behavioral2/files/0x0002000000000729-194.dat family_neshta behavioral2/memory/264-192-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4156-206-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000300000001ea06-208.dat family_neshta behavioral2/memory/3940-211-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000001e85a-214.dat family_neshta behavioral2/memory/1952-223-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000b00000001ee09-225.dat family_neshta behavioral2/memory/1216-235-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4384-246-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4340-247-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5016-249-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3116-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/60-262-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4144-263-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2216-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2876-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1968-273-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3592-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2916-286-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4704-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4444-294-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4368-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2256-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5048-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4076-310-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1120-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation 749955~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 4476 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe 3152 svchost.com 444 749955~1.EXE 624 svchost.com 3492 749955~1.EXE 4712 svchost.com 1432 749955~1.EXE 2916 svchost.com 4900 749955~1.EXE 2192 svchost.com 1868 749955~1.EXE 4984 svchost.com 5096 749955~1.EXE 4816 svchost.com 1208 749955~1.EXE 264 svchost.com 4156 749955~1.EXE 3940 svchost.com 1952 749955~1.EXE 1216 svchost.com 4384 749955~1.EXE 4340 svchost.com 5016 749955~1.EXE 3116 svchost.com 60 749955~1.EXE 4144 svchost.com 2216 749955~1.EXE 2876 svchost.com 1968 749955~1.EXE 3592 svchost.com 2916 749955~1.EXE 4704 svchost.com 4444 749955~1.EXE 4368 svchost.com 2256 749955~1.EXE 5048 svchost.com 4076 749955~1.EXE 1120 svchost.com 4816 749955~1.EXE 4868 svchost.com 1208 749955~1.EXE 3204 svchost.com 1320 749955~1.EXE 5000 svchost.com 2660 749955~1.EXE 1724 svchost.com 2264 749955~1.EXE 2748 svchost.com 4180 749955~1.EXE 5052 svchost.com 4988 749955~1.EXE 3856 svchost.com 4776 749955~1.EXE 4052 svchost.com 4828 749955~1.EXE 4044 svchost.com 4908 749955~1.EXE 1596 svchost.com 1960 749955~1.EXE 3636 svchost.com 1704 749955~1.EXE 2936 svchost.com 3216 749955~1.EXE 2520 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 749955~1.EXE File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\directx.sys 749955~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\directx.sys 749955~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 749955~1.EXE File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 749955~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 749955~1.EXE File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\directx.sys 749955~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 749955~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 749955~1.EXE File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 749955~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\directx.sys 749955~1.EXE File opened for modification C:\Windows\svchost.com 749955~1.EXE File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 749955~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE Key created \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000_Classes\Local Settings 749955~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2596 wrote to memory of 4476 2596 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe 86 PID 2596 wrote to memory of 4476 2596 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe 86 PID 2596 wrote to memory of 4476 2596 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe 86 PID 4476 wrote to memory of 3152 4476 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe 87 PID 4476 wrote to memory of 3152 4476 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe 87 PID 4476 wrote to memory of 3152 4476 749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe 87 PID 3152 wrote to memory of 444 3152 svchost.com 88 PID 3152 wrote to memory of 444 3152 svchost.com 88 PID 3152 wrote to memory of 444 3152 svchost.com 88 PID 444 wrote to memory of 624 444 749955~1.EXE 89 PID 444 wrote to memory of 624 444 749955~1.EXE 89 PID 444 wrote to memory of 624 444 749955~1.EXE 89 PID 624 wrote to memory of 3492 624 svchost.com 90 PID 624 wrote to memory of 3492 624 svchost.com 90 PID 624 wrote to memory of 3492 624 svchost.com 90 PID 3492 wrote to memory of 4712 3492 749955~1.EXE 91 PID 3492 wrote to memory of 4712 3492 749955~1.EXE 91 PID 3492 wrote to memory of 4712 3492 749955~1.EXE 91 PID 4712 wrote to memory of 1432 4712 svchost.com 92 PID 4712 wrote to memory of 1432 4712 svchost.com 92 PID 4712 wrote to memory of 1432 4712 svchost.com 92 PID 1432 wrote to memory of 2916 1432 749955~1.EXE 116 PID 1432 wrote to memory of 2916 1432 749955~1.EXE 116 PID 1432 wrote to memory of 2916 1432 749955~1.EXE 116 PID 2916 wrote to memory of 4900 2916 svchost.com 94 PID 2916 wrote to memory of 4900 2916 svchost.com 94 PID 2916 wrote to memory of 4900 2916 svchost.com 94 PID 4900 wrote to memory of 2192 4900 749955~1.EXE 95 PID 4900 wrote to memory of 2192 4900 749955~1.EXE 95 PID 4900 wrote to memory of 2192 4900 749955~1.EXE 95 PID 2192 wrote to memory of 1868 2192 svchost.com 96 PID 2192 wrote to memory of 1868 2192 svchost.com 96 PID 2192 wrote to memory of 1868 2192 svchost.com 96 PID 1868 wrote to memory of 4984 1868 749955~1.EXE 97 PID 1868 wrote to memory of 4984 1868 749955~1.EXE 97 PID 1868 wrote to memory of 4984 1868 749955~1.EXE 97 PID 4984 wrote to memory of 5096 4984 svchost.com 98 PID 4984 wrote to memory of 5096 4984 svchost.com 98 PID 4984 wrote to memory of 5096 4984 svchost.com 98 PID 5096 wrote to memory of 4816 5096 749955~1.EXE 124 PID 5096 wrote to memory of 4816 5096 749955~1.EXE 124 PID 5096 wrote to memory of 4816 5096 749955~1.EXE 124 PID 4816 wrote to memory of 1208 4816 svchost.com 126 PID 4816 wrote to memory of 1208 4816 svchost.com 126 PID 4816 wrote to memory of 1208 4816 svchost.com 126 PID 1208 wrote to memory of 264 1208 749955~1.EXE 101 PID 1208 wrote to memory of 264 1208 749955~1.EXE 101 PID 1208 wrote to memory of 264 1208 749955~1.EXE 101 PID 264 wrote to memory of 4156 264 svchost.com 102 PID 264 wrote to memory of 4156 264 svchost.com 102 PID 264 wrote to memory of 4156 264 svchost.com 102 PID 4156 wrote to memory of 3940 4156 749955~1.EXE 103 PID 4156 wrote to memory of 3940 4156 749955~1.EXE 103 PID 4156 wrote to memory of 3940 4156 749955~1.EXE 103 PID 3940 wrote to memory of 1952 3940 svchost.com 212 PID 3940 wrote to memory of 1952 3940 svchost.com 212 PID 3940 wrote to memory of 1952 3940 svchost.com 212 PID 1952 wrote to memory of 1216 1952 749955~1.EXE 105 PID 1952 wrote to memory of 1216 1952 749955~1.EXE 105 PID 1952 wrote to memory of 1216 1952 749955~1.EXE 105 PID 1216 wrote to memory of 4384 1216 svchost.com 214 PID 1216 wrote to memory of 4384 1216 svchost.com 214 PID 1216 wrote to memory of 4384 1216 svchost.com 214 PID 4384 wrote to memory of 4340 4384 749955~1.EXE 248
Processes
-
C:\Users\Admin\AppData\Local\Temp\749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe"C:\Users\Admin\AppData\Local\Temp\749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\749955af0110cffec78794d8130865911cf51c59e64b04302fd0aef98bdcba0eN.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE10⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"17⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE22⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"23⤵
- Executes dropped EXE
PID:4340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE24⤵
- Executes dropped EXE
PID:5016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"25⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE26⤵
- Executes dropped EXE
PID:60 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"27⤵
- Executes dropped EXE
PID:4144 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE28⤵
- Executes dropped EXE
PID:2216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"29⤵
- Executes dropped EXE
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE30⤵
- Executes dropped EXE
PID:1968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE32⤵
- Executes dropped EXE
PID:2916 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"33⤵
- Executes dropped EXE
PID:4704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE34⤵
- Executes dropped EXE
PID:4444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"35⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE36⤵
- Executes dropped EXE
PID:2256 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"37⤵
- Executes dropped EXE
PID:5048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE38⤵
- Executes dropped EXE
PID:4076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE40⤵
- Executes dropped EXE
- Modifies registry class
PID:4816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"41⤵
- Executes dropped EXE
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE42⤵
- Executes dropped EXE
- Modifies registry class
PID:1208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"43⤵
- Executes dropped EXE
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"45⤵
- Executes dropped EXE
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2660 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE48⤵
- Executes dropped EXE
PID:2264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"49⤵
- Executes dropped EXE
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE50⤵
- Executes dropped EXE
PID:4180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"51⤵
- Executes dropped EXE
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"53⤵
- Executes dropped EXE
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE54⤵
- Executes dropped EXE
PID:4776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"55⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE56⤵
- Executes dropped EXE
PID:4828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"57⤵
- Executes dropped EXE
PID:4044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE58⤵
- Executes dropped EXE
PID:4908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"59⤵
- Executes dropped EXE
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
PID:1960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"63⤵
- Executes dropped EXE
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"65⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE66⤵
- Modifies registry class
PID:3280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"67⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE68⤵PID:3520
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"69⤵
- Drops file in Windows directory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE70⤵PID:4060
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"71⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE72⤵
- Modifies registry class
PID:2292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"73⤵
- Drops file in Windows directory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE74⤵PID:5056
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"75⤵
- Drops file in Windows directory
PID:3400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE76⤵PID:1352
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"77⤵PID:1280
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE78⤵PID:468
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"79⤵
- System Location Discovery: System Language Discovery
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE80⤵
- Checks computer location settings
PID:1648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"81⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE82⤵
- System Location Discovery: System Language Discovery
PID:2328 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"83⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE84⤵
- Checks computer location settings
PID:3404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"85⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE86⤵PID:4720
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"87⤵PID:3856
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE88⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:4132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"89⤵
- System Location Discovery: System Language Discovery
PID:4052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE90⤵
- Checks computer location settings
PID:2380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"91⤵PID:4152
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE92⤵
- Modifies registry class
PID:4496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"93⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE94⤵
- Modifies registry class
PID:2372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"95⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE96⤵PID:4788
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"97⤵PID:4292
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE98⤵PID:2408
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"99⤵PID:3820
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE100⤵
- Checks computer location settings
PID:1976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"101⤵PID:3592
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE102⤵PID:1224
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"103⤵PID:1500
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE104⤵
- Drops file in Windows directory
- Modifies registry class
PID:4560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"105⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE106⤵PID:4900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"107⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE108⤵
- Drops file in Windows directory
PID:1928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"109⤵PID:3976
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE110⤵PID:856
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE112⤵PID:4076
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"113⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE114⤵
- Modifies registry class
PID:5092 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"115⤵
- System Location Discovery: System Language Discovery
PID:4600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE116⤵
- Checks computer location settings
PID:4948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"117⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE118⤵
- Checks computer location settings
- Modifies registry class
PID:4596 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"119⤵
- Drops file in Windows directory
PID:4580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE120⤵
- Drops file in Windows directory
PID:1012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE"121⤵
- System Location Discovery: System Language Discovery
PID:4356 -
C:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\749955~1.EXE122⤵
- Modifies registry class
PID:3904
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-