Analysis
-
max time kernel
30s -
max time network
98s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 20:39
Behavioral task
behavioral1
Sample
06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe
Resource
win10v2004-20241007-en
General
-
Target
06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe
-
Size
173KB
-
MD5
739342ecd4ceea0512023b97ed456190
-
SHA1
3378f803fba9a33fef691d5b5a8db906af8732b9
-
SHA256
06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13
-
SHA512
c1338f28c652545982ece4097a850d97978730ee1ed4b970583db679a653319dcb7512d286219a54a8734d6664862313973c878067edc35c12273866b14fd25e
-
SSDEEP
3072:sr85CVooxlgKfSndp0CZtMHpz68Ab7jr85C:k9VFgKadJxD9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0008000000023c84-4.dat family_neshta behavioral2/files/0x0007000000023c89-10.dat family_neshta behavioral2/memory/4104-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3044-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3440-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/460-39-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1936-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2528-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4856-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1076-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3300-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2692-68-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4472-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2044-80-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002035f-89.dat family_neshta behavioral2/files/0x000600000002022e-98.dat family_neshta behavioral2/files/0x00010000000202b0-103.dat family_neshta behavioral2/files/0x0001000000020241-102.dat family_neshta behavioral2/memory/4208-124-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020249-114.dat family_neshta behavioral2/files/0x0004000000020325-113.dat family_neshta behavioral2/files/0x00010000000202ab-112.dat family_neshta behavioral2/files/0x0004000000020364-111.dat family_neshta behavioral2/memory/1972-105-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000600000002023a-97.dat family_neshta behavioral2/files/0x0006000000020232-96.dat family_neshta behavioral2/files/0x000700000002029a-94.dat family_neshta behavioral2/memory/2456-126-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/372-130-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1012-140-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3760-154-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0002000000020329-142.dat family_neshta behavioral2/files/0x00010000000214f6-165.dat family_neshta behavioral2/files/0x0001000000022f47-168.dat family_neshta behavioral2/files/0x00010000000214f5-164.dat family_neshta behavioral2/files/0x00010000000214f4-163.dat family_neshta behavioral2/files/0x00010000000225f4-162.dat family_neshta behavioral2/files/0x0001000000022f84-181.dat family_neshta behavioral2/files/0x00010000000167c6-187.dat family_neshta behavioral2/files/0x00010000000167c8-186.dat family_neshta behavioral2/files/0x00010000000167ad-185.dat family_neshta behavioral2/files/0x00010000000167ff-184.dat family_neshta behavioral2/files/0x0001000000022f86-180.dat family_neshta behavioral2/memory/1924-218-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4040-229-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/628-234-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2436-238-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4352-244-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3260-251-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4828-252-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2180-254-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4368-260-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3856-262-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4380-268-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4536-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2140-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2508-278-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3096-284-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1068-286-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4956-292-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/752-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4984-300-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4696-307-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4916-308-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 06D906~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 1288 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe 4104 svchost.com 3044 06D906~1.EXE 3440 svchost.com 460 06D906~1.EXE 1936 svchost.com 2528 06D906~1.EXE 4856 svchost.com 1076 06D906~1.EXE 3300 svchost.com 2692 06D906~1.EXE 4472 svchost.com 2044 06D906~1.EXE 1972 svchost.com 4208 06D906~1.EXE 2456 svchost.com 372 06D906~1.EXE 1012 svchost.com 3760 06D906~1.EXE 1924 svchost.com 4040 06D906~1.EXE 628 svchost.com 2436 06D906~1.EXE 4352 svchost.com 3260 06D906~1.EXE 4828 svchost.com 2180 06D906~1.EXE 4368 svchost.com 3856 06D906~1.EXE 4380 svchost.com 4536 06D906~1.EXE 2140 svchost.com 2508 06D906~1.EXE 3096 svchost.com 1068 06D906~1.EXE 4956 svchost.com 752 06D906~1.EXE 4984 svchost.com 4696 06D906~1.EXE 4916 svchost.com 4944 06D906~1.EXE 452 svchost.com 3676 06D906~1.EXE 2068 svchost.com 3904 06D906~1.EXE 5072 svchost.com 508 06D906~1.EXE 3544 svchost.com 1500 06D906~1.EXE 4100 svchost.com 980 06D906~1.EXE 2848 svchost.com 2680 06D906~1.EXE 2308 svchost.com 1828 06D906~1.EXE 2992 svchost.com 2616 06D906~1.EXE 3728 svchost.com 3724 06D906~1.EXE 636 svchost.com 3752 06D906~1.EXE 4784 svchost.com 4308 06D906~1.EXE 4316 svchost.com -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 06D906~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 06D906~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 06D906~1.EXE File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 06D906~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 06D906~1.EXE File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 06D906~1.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 06D906~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 06D906~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\svchost.com 06D906~1.EXE File opened for modification C:\Windows\svchost.com 06D906~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06D906~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 06D906~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4212 wrote to memory of 1288 4212 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe 82 PID 4212 wrote to memory of 1288 4212 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe 82 PID 4212 wrote to memory of 1288 4212 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe 82 PID 1288 wrote to memory of 4104 1288 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe 83 PID 1288 wrote to memory of 4104 1288 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe 83 PID 1288 wrote to memory of 4104 1288 06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe 83 PID 4104 wrote to memory of 3044 4104 svchost.com 84 PID 4104 wrote to memory of 3044 4104 svchost.com 84 PID 4104 wrote to memory of 3044 4104 svchost.com 84 PID 3044 wrote to memory of 3440 3044 06D906~1.EXE 85 PID 3044 wrote to memory of 3440 3044 06D906~1.EXE 85 PID 3044 wrote to memory of 3440 3044 06D906~1.EXE 85 PID 3440 wrote to memory of 460 3440 svchost.com 86 PID 3440 wrote to memory of 460 3440 svchost.com 86 PID 3440 wrote to memory of 460 3440 svchost.com 86 PID 460 wrote to memory of 1936 460 06D906~1.EXE 87 PID 460 wrote to memory of 1936 460 06D906~1.EXE 87 PID 460 wrote to memory of 1936 460 06D906~1.EXE 87 PID 1936 wrote to memory of 2528 1936 svchost.com 88 PID 1936 wrote to memory of 2528 1936 svchost.com 88 PID 1936 wrote to memory of 2528 1936 svchost.com 88 PID 2528 wrote to memory of 4856 2528 06D906~1.EXE 89 PID 2528 wrote to memory of 4856 2528 06D906~1.EXE 89 PID 2528 wrote to memory of 4856 2528 06D906~1.EXE 89 PID 4856 wrote to memory of 1076 4856 svchost.com 90 PID 4856 wrote to memory of 1076 4856 svchost.com 90 PID 4856 wrote to memory of 1076 4856 svchost.com 90 PID 1076 wrote to memory of 3300 1076 06D906~1.EXE 91 PID 1076 wrote to memory of 3300 1076 06D906~1.EXE 91 PID 1076 wrote to memory of 3300 1076 06D906~1.EXE 91 PID 3300 wrote to memory of 2692 3300 svchost.com 92 PID 3300 wrote to memory of 2692 3300 svchost.com 92 PID 3300 wrote to memory of 2692 3300 svchost.com 92 PID 2692 wrote to memory of 4472 2692 06D906~1.EXE 93 PID 2692 wrote to memory of 4472 2692 06D906~1.EXE 93 PID 2692 wrote to memory of 4472 2692 06D906~1.EXE 93 PID 4472 wrote to memory of 2044 4472 svchost.com 94 PID 4472 wrote to memory of 2044 4472 svchost.com 94 PID 4472 wrote to memory of 2044 4472 svchost.com 94 PID 2044 wrote to memory of 1972 2044 06D906~1.EXE 95 PID 2044 wrote to memory of 1972 2044 06D906~1.EXE 95 PID 2044 wrote to memory of 1972 2044 06D906~1.EXE 95 PID 1972 wrote to memory of 4208 1972 svchost.com 96 PID 1972 wrote to memory of 4208 1972 svchost.com 96 PID 1972 wrote to memory of 4208 1972 svchost.com 96 PID 4208 wrote to memory of 2456 4208 06D906~1.EXE 97 PID 4208 wrote to memory of 2456 4208 06D906~1.EXE 97 PID 4208 wrote to memory of 2456 4208 06D906~1.EXE 97 PID 2456 wrote to memory of 372 2456 svchost.com 169 PID 2456 wrote to memory of 372 2456 svchost.com 169 PID 2456 wrote to memory of 372 2456 svchost.com 169 PID 372 wrote to memory of 1012 372 06D906~1.EXE 99 PID 372 wrote to memory of 1012 372 06D906~1.EXE 99 PID 372 wrote to memory of 1012 372 06D906~1.EXE 99 PID 1012 wrote to memory of 3760 1012 svchost.com 100 PID 1012 wrote to memory of 3760 1012 svchost.com 100 PID 1012 wrote to memory of 3760 1012 svchost.com 100 PID 3760 wrote to memory of 1924 3760 06D906~1.EXE 101 PID 3760 wrote to memory of 1924 3760 06D906~1.EXE 101 PID 3760 wrote to memory of 1924 3760 06D906~1.EXE 101 PID 1924 wrote to memory of 4040 1924 svchost.com 217 PID 1924 wrote to memory of 4040 1924 svchost.com 217 PID 1924 wrote to memory of 4040 1924 svchost.com 217 PID 4040 wrote to memory of 628 4040 06D906~1.EXE 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe"C:\Users\Admin\AppData\Local\Temp\06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4212 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\06d906c884cf44d070af9b37f1eb630e3f4d4d51965051c977308dae53a7ee13N.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4104 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE8⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"17⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"23⤵
- Executes dropped EXE
PID:628 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"25⤵
- Executes dropped EXE
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
PID:3260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"27⤵
- Executes dropped EXE
PID:4828 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE28⤵
- Executes dropped EXE
- Modifies registry class
PID:2180 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"29⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"31⤵
- Executes dropped EXE
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE32⤵
- Executes dropped EXE
- Modifies registry class
PID:4536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"33⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
PID:2508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"35⤵
- Executes dropped EXE
PID:3096 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE36⤵
- Executes dropped EXE
- Modifies registry class
PID:1068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE38⤵
- Executes dropped EXE
- Modifies registry class
PID:752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"39⤵
- Executes dropped EXE
PID:4984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE40⤵
- Executes dropped EXE
- Modifies registry class
PID:4696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"41⤵
- Executes dropped EXE
PID:4916 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:452 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE44⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"45⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"47⤵
- Executes dropped EXE
PID:5072 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE48⤵
- Executes dropped EXE
- Modifies registry class
PID:508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"49⤵
- Executes dropped EXE
PID:3544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE50⤵
- Executes dropped EXE
- Modifies registry class
PID:1500 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"53⤵
- Executes dropped EXE
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"55⤵
- Executes dropped EXE
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE56⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3728 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3724 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"61⤵
- Executes dropped EXE
PID:636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"63⤵
- Executes dropped EXE
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"65⤵
- Executes dropped EXE
PID:4316 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE66⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:2220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"67⤵PID:3596
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE68⤵
- Checks computer location settings
- Modifies registry class
PID:4532 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"69⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE70⤵
- Checks computer location settings
PID:2140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"71⤵
- System Location Discovery: System Language Discovery
PID:460 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE72⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"73⤵
- System Location Discovery: System Language Discovery
PID:4112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE74⤵
- Checks computer location settings
PID:4016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"75⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3240 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE76⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"77⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE78⤵
- Drops file in Windows directory
- Modifies registry class
PID:4932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"79⤵
- System Location Discovery: System Language Discovery
PID:4348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE80⤵
- Modifies registry class
PID:2020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"81⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE82⤵PID:1232
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"83⤵
- Drops file in Windows directory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE84⤵
- Checks computer location settings
- Modifies registry class
PID:372 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"85⤵PID:5100
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE86⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4656 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"87⤵
- System Location Discovery: System Language Discovery
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE88⤵PID:4744
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"89⤵PID:3784
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE90⤵
- Checks computer location settings
PID:2444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"91⤵
- System Location Discovery: System Language Discovery
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE92⤵PID:1828
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"93⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE94⤵
- Checks computer location settings
- Drops file in Windows directory
PID:1320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"95⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE96⤵
- Checks computer location settings
- Modifies registry class
PID:364 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"97⤵PID:3512
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE98⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"99⤵PID:3992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE100⤵
- Checks computer location settings
- Modifies registry class
PID:2176 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"101⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE102⤵
- Checks computer location settings
- Drops file in Windows directory
PID:552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"103⤵PID:3848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE104⤵
- Modifies registry class
PID:2140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"105⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE106⤵
- Checks computer location settings
PID:4336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"107⤵
- Drops file in Windows directory
PID:400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE108⤵
- Checks computer location settings
PID:3000 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"109⤵
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE110⤵
- Checks computer location settings
PID:1728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"111⤵PID:3916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE112⤵
- Checks computer location settings
PID:2864 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"113⤵PID:3256
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE114⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"115⤵PID:4932
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE116⤵
- Modifies registry class
PID:4248 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"117⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE118⤵PID:1736
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"119⤵PID:508
-
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE120⤵
- Checks computer location settings
PID:1196 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE"121⤵
- Drops file in Windows directory
PID:4640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\06D906~1.EXE122⤵
- Checks computer location settings
- Drops file in Windows directory
PID:448
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-