Analysis
-
max time kernel
93s -
max time network
114s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 13:06
Behavioral task
behavioral1
Sample
6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe
Resource
win10v2004-20241007-en
General
-
Target
6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe
-
Size
404KB
-
MD5
7669095339ef3ba8ecc243fb764db290
-
SHA1
4e91ef6578b193835750804d62100ccddf6629e9
-
SHA256
6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6
-
SHA512
56bb7fccdedcd7a42a8630d9cee0f26577e547f60933578db1a53a7daaef72990c26a6c63fff53b29626f513c83fa5d471a126144e9fef6c26b2840258850937
-
SSDEEP
6144:k9pYXf9sWreD5D+Ox1hwDXPtBSp5GL9p:uYX45D+QSTtoTG
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0007000000023c9b-4.dat family_neshta behavioral2/files/0x0007000000023c9c-10.dat family_neshta behavioral2/memory/4852-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4788-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4368-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3604-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/620-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1184-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1952-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3036-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/312-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020368-66.dat family_neshta behavioral2/files/0x0006000000020241-72.dat family_neshta behavioral2/files/0x000400000002036d-99.dat family_neshta behavioral2/files/0x00010000000202b4-100.dat family_neshta behavioral2/files/0x00010000000202cc-98.dat family_neshta behavioral2/memory/3516-114-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2912-110-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002035b-97.dat family_neshta behavioral2/files/0x00010000000202b9-96.dat family_neshta behavioral2/files/0x000100000002024a-95.dat family_neshta behavioral2/memory/3028-92-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020157-71.dat family_neshta behavioral2/files/0x00070000000202a3-70.dat family_neshta behavioral2/memory/1944-119-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4772-115-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3044-127-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4508-139-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0002000000020332-141.dat family_neshta behavioral2/files/0x0001000000021501-152.dat family_neshta behavioral2/files/0x0001000000021500-150.dat family_neshta behavioral2/files/0x00010000000214ff-149.dat family_neshta behavioral2/files/0x0001000000022f95-163.dat family_neshta behavioral2/files/0x0001000000022f93-164.dat family_neshta behavioral2/memory/4680-173-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167cd-178.dat family_neshta behavioral2/files/0x000100000001680e-177.dat family_neshta behavioral2/files/0x000100000001dbb9-184.dat family_neshta behavioral2/files/0x000100000001691d-189.dat family_neshta behavioral2/files/0x0001000000016921-196.dat family_neshta behavioral2/memory/3484-214-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4420-230-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2292-234-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3368-246-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3868-253-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1568-256-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3760-263-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3176-264-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1084-266-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3628-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3864-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1804-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1428-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2028-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4996-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1876-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1380-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2100-304-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/932-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4200-312-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1956-314-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4444-320-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2104-322-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2696-328-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 6B0A02~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 1068 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe 4852 svchost.com 4788 6B0A02~1.EXE 4368 svchost.com 3604 6B0A02~1.EXE 620 svchost.com 1184 6B0A02~1.EXE 3036 svchost.com 1952 6B0A02~1.EXE 312 svchost.com 3028 6B0A02~1.EXE 2912 svchost.com 3516 6B0A02~1.EXE 4772 svchost.com 1944 6B0A02~1.EXE 3044 svchost.com 4508 6B0A02~1.EXE 4680 svchost.com 3484 6B0A02~1.EXE 4420 svchost.com 2292 6B0A02~1.EXE 3368 svchost.com 3868 6B0A02~1.EXE 1568 svchost.com 3760 6B0A02~1.EXE 3176 svchost.com 1084 6B0A02~1.EXE 3628 svchost.com 3864 6B0A02~1.EXE 1804 svchost.com 1428 6B0A02~1.EXE 2028 svchost.com 4996 6B0A02~1.EXE 1876 svchost.com 1380 6B0A02~1.EXE 2100 svchost.com 932 6B0A02~1.EXE 4200 svchost.com 1956 6B0A02~1.EXE 4444 svchost.com 2104 6B0A02~1.EXE 2696 svchost.com 2376 6B0A02~1.EXE 832 svchost.com 4252 6B0A02~1.EXE 3364 svchost.com 4172 6B0A02~1.EXE 976 svchost.com 4348 6B0A02~1.EXE 1628 svchost.com 5016 6B0A02~1.EXE 5064 svchost.com 5080 6B0A02~1.EXE 2960 svchost.com 3948 6B0A02~1.EXE 3184 svchost.com 1608 6B0A02~1.EXE 1528 svchost.com 2628 6B0A02~1.EXE 4620 svchost.com 3964 6B0A02~1.EXE 3760 svchost.com 4832 6B0A02~1.EXE 4532 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com 6B0A02~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6B0A02~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings 6B0A02~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 748 wrote to memory of 1068 748 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe 83 PID 748 wrote to memory of 1068 748 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe 83 PID 748 wrote to memory of 1068 748 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe 83 PID 1068 wrote to memory of 4852 1068 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe 84 PID 1068 wrote to memory of 4852 1068 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe 84 PID 1068 wrote to memory of 4852 1068 6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe 84 PID 4852 wrote to memory of 4788 4852 svchost.com 85 PID 4852 wrote to memory of 4788 4852 svchost.com 85 PID 4852 wrote to memory of 4788 4852 svchost.com 85 PID 4788 wrote to memory of 4368 4788 6B0A02~1.EXE 86 PID 4788 wrote to memory of 4368 4788 6B0A02~1.EXE 86 PID 4788 wrote to memory of 4368 4788 6B0A02~1.EXE 86 PID 4368 wrote to memory of 3604 4368 svchost.com 87 PID 4368 wrote to memory of 3604 4368 svchost.com 87 PID 4368 wrote to memory of 3604 4368 svchost.com 87 PID 3604 wrote to memory of 620 3604 6B0A02~1.EXE 88 PID 3604 wrote to memory of 620 3604 6B0A02~1.EXE 88 PID 3604 wrote to memory of 620 3604 6B0A02~1.EXE 88 PID 620 wrote to memory of 1184 620 svchost.com 89 PID 620 wrote to memory of 1184 620 svchost.com 89 PID 620 wrote to memory of 1184 620 svchost.com 89 PID 1184 wrote to memory of 3036 1184 6B0A02~1.EXE 90 PID 1184 wrote to memory of 3036 1184 6B0A02~1.EXE 90 PID 1184 wrote to memory of 3036 1184 6B0A02~1.EXE 90 PID 3036 wrote to memory of 1952 3036 svchost.com 91 PID 3036 wrote to memory of 1952 3036 svchost.com 91 PID 3036 wrote to memory of 1952 3036 svchost.com 91 PID 1952 wrote to memory of 312 1952 6B0A02~1.EXE 92 PID 1952 wrote to memory of 312 1952 6B0A02~1.EXE 92 PID 1952 wrote to memory of 312 1952 6B0A02~1.EXE 92 PID 312 wrote to memory of 3028 312 svchost.com 93 PID 312 wrote to memory of 3028 312 svchost.com 93 PID 312 wrote to memory of 3028 312 svchost.com 93 PID 3028 wrote to memory of 2912 3028 6B0A02~1.EXE 94 PID 3028 wrote to memory of 2912 3028 6B0A02~1.EXE 94 PID 3028 wrote to memory of 2912 3028 6B0A02~1.EXE 94 PID 2912 wrote to memory of 3516 2912 svchost.com 95 PID 2912 wrote to memory of 3516 2912 svchost.com 95 PID 2912 wrote to memory of 3516 2912 svchost.com 95 PID 3516 wrote to memory of 4772 3516 6B0A02~1.EXE 166 PID 3516 wrote to memory of 4772 3516 6B0A02~1.EXE 166 PID 3516 wrote to memory of 4772 3516 6B0A02~1.EXE 166 PID 4772 wrote to memory of 1944 4772 svchost.com 97 PID 4772 wrote to memory of 1944 4772 svchost.com 97 PID 4772 wrote to memory of 1944 4772 svchost.com 97 PID 1944 wrote to memory of 3044 1944 6B0A02~1.EXE 98 PID 1944 wrote to memory of 3044 1944 6B0A02~1.EXE 98 PID 1944 wrote to memory of 3044 1944 6B0A02~1.EXE 98 PID 3044 wrote to memory of 4508 3044 svchost.com 99 PID 3044 wrote to memory of 4508 3044 svchost.com 99 PID 3044 wrote to memory of 4508 3044 svchost.com 99 PID 4508 wrote to memory of 4680 4508 6B0A02~1.EXE 100 PID 4508 wrote to memory of 4680 4508 6B0A02~1.EXE 100 PID 4508 wrote to memory of 4680 4508 6B0A02~1.EXE 100 PID 4680 wrote to memory of 3484 4680 svchost.com 101 PID 4680 wrote to memory of 3484 4680 svchost.com 101 PID 4680 wrote to memory of 3484 4680 svchost.com 101 PID 3484 wrote to memory of 4420 3484 6B0A02~1.EXE 102 PID 3484 wrote to memory of 4420 3484 6B0A02~1.EXE 102 PID 3484 wrote to memory of 4420 3484 6B0A02~1.EXE 102 PID 4420 wrote to memory of 2292 4420 svchost.com 103 PID 4420 wrote to memory of 2292 4420 svchost.com 103 PID 4420 wrote to memory of 2292 4420 svchost.com 103 PID 2292 wrote to memory of 3368 2292 6B0A02~1.EXE 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe"C:\Users\Admin\AppData\Local\Temp\6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\6b0a02dac907e95a899f5aa6e540d4a5c76dcd9f136da44eff496040ddfabbf6N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE4⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"15⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"21⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"23⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"25⤵
- Executes dropped EXE
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"27⤵
- Executes dropped EXE
PID:3176 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE28⤵
- Executes dropped EXE
- Modifies registry class
PID:1084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE32⤵
- Executes dropped EXE
PID:1428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"33⤵
- Executes dropped EXE
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
PID:4996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"35⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE36⤵
- Executes dropped EXE
PID:1380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"37⤵
- Executes dropped EXE
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"41⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:2104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"43⤵
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2376 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"45⤵
- Executes dropped EXE
PID:832 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE46⤵
- Executes dropped EXE
- Modifies registry class
PID:4252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE48⤵
- Executes dropped EXE
PID:4172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"49⤵
- Executes dropped EXE
PID:976 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"51⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"53⤵
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE54⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"55⤵
- Executes dropped EXE
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"57⤵
- Executes dropped EXE
PID:3184 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE58⤵
- Executes dropped EXE
PID:1608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"59⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
PID:2628 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
PID:3964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"63⤵
- Executes dropped EXE
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"65⤵
- Executes dropped EXE
PID:4532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE66⤵
- Modifies registry class
PID:2540 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"67⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE68⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"69⤵
- Drops file in Windows directory
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE70⤵
- Modifies registry class
PID:3148 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"71⤵
- Drops file in Windows directory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE72⤵
- Checks computer location settings
- Modifies registry class
PID:2212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"73⤵
- Drops file in Windows directory
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE74⤵
- Drops file in Windows directory
- Modifies registry class
PID:932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"75⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE76⤵
- Modifies registry class
PID:556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"77⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE78⤵
- Modifies registry class
PID:2892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"79⤵PID:1864
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE80⤵PID:4768
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"81⤵PID:4772
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE82⤵
- System Location Discovery: System Language Discovery
PID:4252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"83⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE84⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"85⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE86⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"87⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE88⤵
- System Location Discovery: System Language Discovery
PID:3652 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"89⤵
- Drops file in Windows directory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE90⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"91⤵PID:1552
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE92⤵
- Checks computer location settings
PID:2904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"93⤵
- System Location Discovery: System Language Discovery
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE94⤵
- Checks computer location settings
- Modifies registry class
PID:3196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"95⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE96⤵
- Drops file in Windows directory
- Modifies registry class
PID:4560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"97⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE98⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"99⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE100⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"101⤵PID:3340
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE102⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"103⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE104⤵
- Modifies registry class
PID:4532 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"105⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE106⤵
- Checks computer location settings
- Modifies registry class
PID:1612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"107⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE108⤵
- Modifies registry class
PID:2888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"109⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE110⤵
- Checks computer location settings
PID:212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"111⤵PID:4368
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE112⤵
- Checks computer location settings
- Modifies registry class
PID:2980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"113⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE114⤵
- Checks computer location settings
PID:3200 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"115⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE116⤵PID:624
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE118⤵PID:3588
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"119⤵PID:4056
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE120⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE"121⤵PID:5068
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6B0A02~1.EXE122⤵PID:1780
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-