Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
05-01-2025 00:42
Behavioral task
behavioral1
Sample
6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe
Resource
win10v2004-20241007-en
General
-
Target
6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe
-
Size
182KB
-
MD5
b6e743550abd61d79b63f36659154374
-
SHA1
1f15e7aed8535afb7769e72b9c081bc8721ca708
-
SHA256
6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb
-
SHA512
0fdbe050ffe1f0848a16311c526283d3399d5ad0ce1c91a06bd4b86f9dddbd705d338cc24ac45fbd4173f255f38efe290dd1481e36c4401c101fc5a43df6893d
-
SSDEEP
3072:sr85CBkfpLoKpGoTX5o+gxtTecfQm24WbX5WvmRUq//tyH99g4byc6H5c6HcT66b:k9BkfpLoKMogS3mwUeRUq3tyH7xOc6Hi
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000b000000023b65-17.dat family_neshta behavioral2/files/0x000a000000023b6a-23.dat family_neshta behavioral2/memory/2896-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3696-41-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1108-42-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2272-46-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4700-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2008-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3188-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3080-70-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1744-78-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4592-89-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000700000002029a-92.dat family_neshta behavioral2/files/0x0006000000020232-94.dat family_neshta behavioral2/files/0x0004000000020364-110.dat family_neshta behavioral2/memory/3676-114-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4888-125-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5012-126-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0002000000020329-140.dat family_neshta behavioral2/memory/4620-141-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214f4-144.dat family_neshta behavioral2/memory/5000-149-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000214f6-153.dat family_neshta behavioral2/files/0x00010000000214f5-151.dat family_neshta behavioral2/files/0x0001000000022f47-158.dat family_neshta behavioral2/files/0x0001000000022f48-172.dat family_neshta behavioral2/memory/2428-175-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167c6-184.dat family_neshta behavioral2/files/0x00010000000167c8-183.dat family_neshta behavioral2/files/0x00010000000167ad-182.dat family_neshta behavioral2/files/0x00010000000167ca-190.dat family_neshta behavioral2/files/0x00010000000167e7-195.dat family_neshta behavioral2/files/0x0001000000016910-213.dat family_neshta behavioral2/files/0x0001000000016914-212.dat family_neshta behavioral2/memory/2536-207-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000100000001dbc7-203.dat family_neshta behavioral2/memory/3140-188-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4524-243-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4312-250-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3584-256-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1036-258-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/856-264-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3504-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3932-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1080-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3856-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2932-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4700-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2436-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/788-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1220-298-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1564-304-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3556-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5064-312-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4272-314-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2944-320-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3568-322-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5052-328-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2528-330-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3968-336-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2268-343-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4788-344-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4356-351-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4748-352-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation 6FB6C6~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 384 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 3960 svchost.exe 764 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 1624 svchost.exe 2896 svchost.com 3696 6FB6C6~1.EXE 1108 svchost.com 2272 6FB6C6~1.EXE 4700 svchost.com 2008 6FB6C6~1.EXE 3188 svchost.com 3080 6FB6C6~1.EXE 1744 svchost.com 4592 6FB6C6~1.EXE 3676 svchost.com 4888 6FB6C6~1.EXE 5012 svchost.com 4620 6FB6C6~1.EXE 5000 svchost.com 2428 6FB6C6~1.EXE 3140 svchost.com 2536 6FB6C6~1.EXE 4524 svchost.com 4312 6FB6C6~1.EXE 3584 svchost.com 1036 6FB6C6~1.EXE 856 svchost.com 3504 6FB6C6~1.EXE 3932 svchost.com 1080 6FB6C6~1.EXE 3856 svchost.com 2932 6FB6C6~1.EXE 4700 svchost.com 2436 6FB6C6~1.EXE 788 svchost.com 1220 6FB6C6~1.EXE 1564 svchost.com 3556 6FB6C6~1.EXE 5064 svchost.com 4272 6FB6C6~1.EXE 2944 svchost.com 3568 6FB6C6~1.EXE 5052 svchost.com 2528 6FB6C6~1.EXE 3968 svchost.com 2268 6FB6C6~1.EXE 4788 svchost.com 4356 6FB6C6~1.EXE 4748 svchost.com 3936 6FB6C6~1.EXE 1448 svchost.com 3140 6FB6C6~1.EXE 2472 svchost.com 2536 6FB6C6~1.EXE 4436 svchost.com 1968 6FB6C6~1.EXE 3940 svchost.com 4524 6FB6C6~1.EXE 4512 svchost.com 3956 6FB6C6~1.EXE 3060 svchost.com 4608 6FB6C6~1.EXE 856 svchost.com 4336 6FB6C6~1.EXE -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jconsole.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe svchost.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe svchost.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\Installer\setup.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jsadebugd.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\java-rmi.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 6FB6C6~1.EXE File opened for modification C:\Windows\svchost.com 6FB6C6~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6FB6C6~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE Key created \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000_Classes\Local Settings 6FB6C6~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2984 wrote to memory of 384 2984 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 82 PID 2984 wrote to memory of 384 2984 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 82 PID 2984 wrote to memory of 384 2984 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 82 PID 384 wrote to memory of 3960 384 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 83 PID 384 wrote to memory of 3960 384 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 83 PID 384 wrote to memory of 3960 384 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 83 PID 3960 wrote to memory of 764 3960 svchost.exe 84 PID 3960 wrote to memory of 764 3960 svchost.exe 84 PID 3960 wrote to memory of 764 3960 svchost.exe 84 PID 764 wrote to memory of 2896 764 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 86 PID 764 wrote to memory of 2896 764 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 86 PID 764 wrote to memory of 2896 764 6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe 86 PID 2896 wrote to memory of 3696 2896 svchost.com 87 PID 2896 wrote to memory of 3696 2896 svchost.com 87 PID 2896 wrote to memory of 3696 2896 svchost.com 87 PID 3696 wrote to memory of 1108 3696 6FB6C6~1.EXE 88 PID 3696 wrote to memory of 1108 3696 6FB6C6~1.EXE 88 PID 3696 wrote to memory of 1108 3696 6FB6C6~1.EXE 88 PID 1108 wrote to memory of 2272 1108 svchost.com 89 PID 1108 wrote to memory of 2272 1108 svchost.com 89 PID 1108 wrote to memory of 2272 1108 svchost.com 89 PID 2272 wrote to memory of 4700 2272 6FB6C6~1.EXE 114 PID 2272 wrote to memory of 4700 2272 6FB6C6~1.EXE 114 PID 2272 wrote to memory of 4700 2272 6FB6C6~1.EXE 114 PID 4700 wrote to memory of 2008 4700 svchost.com 91 PID 4700 wrote to memory of 2008 4700 svchost.com 91 PID 4700 wrote to memory of 2008 4700 svchost.com 91 PID 2008 wrote to memory of 3188 2008 6FB6C6~1.EXE 92 PID 2008 wrote to memory of 3188 2008 6FB6C6~1.EXE 92 PID 2008 wrote to memory of 3188 2008 6FB6C6~1.EXE 92 PID 3188 wrote to memory of 3080 3188 svchost.com 93 PID 3188 wrote to memory of 3080 3188 svchost.com 93 PID 3188 wrote to memory of 3080 3188 svchost.com 93 PID 3080 wrote to memory of 1744 3080 6FB6C6~1.EXE 94 PID 3080 wrote to memory of 1744 3080 6FB6C6~1.EXE 94 PID 3080 wrote to memory of 1744 3080 6FB6C6~1.EXE 94 PID 1744 wrote to memory of 4592 1744 svchost.com 95 PID 1744 wrote to memory of 4592 1744 svchost.com 95 PID 1744 wrote to memory of 4592 1744 svchost.com 95 PID 4592 wrote to memory of 3676 4592 6FB6C6~1.EXE 96 PID 4592 wrote to memory of 3676 4592 6FB6C6~1.EXE 96 PID 4592 wrote to memory of 3676 4592 6FB6C6~1.EXE 96 PID 3676 wrote to memory of 4888 3676 svchost.com 97 PID 3676 wrote to memory of 4888 3676 svchost.com 97 PID 3676 wrote to memory of 4888 3676 svchost.com 97 PID 4888 wrote to memory of 5012 4888 6FB6C6~1.EXE 98 PID 4888 wrote to memory of 5012 4888 6FB6C6~1.EXE 98 PID 4888 wrote to memory of 5012 4888 6FB6C6~1.EXE 98 PID 5012 wrote to memory of 4620 5012 svchost.com 99 PID 5012 wrote to memory of 4620 5012 svchost.com 99 PID 5012 wrote to memory of 4620 5012 svchost.com 99 PID 4620 wrote to memory of 5000 4620 6FB6C6~1.EXE 100 PID 4620 wrote to memory of 5000 4620 6FB6C6~1.EXE 100 PID 4620 wrote to memory of 5000 4620 6FB6C6~1.EXE 100 PID 5000 wrote to memory of 2428 5000 svchost.com 101 PID 5000 wrote to memory of 2428 5000 svchost.com 101 PID 5000 wrote to memory of 2428 5000 svchost.com 101 PID 2428 wrote to memory of 3140 2428 6FB6C6~1.EXE 133 PID 2428 wrote to memory of 3140 2428 6FB6C6~1.EXE 133 PID 2428 wrote to memory of 3140 2428 6FB6C6~1.EXE 133 PID 3140 wrote to memory of 2536 3140 svchost.com 135 PID 3140 wrote to memory of 2536 3140 svchost.com 135 PID 3140 wrote to memory of 2536 3140 svchost.com 135 PID 2536 wrote to memory of 4524 2536 6FB6C6~1.EXE 139
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe"C:\Users\Admin\AppData\Local\Temp\6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3960 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\6fb6c67c3edb59bc10faa0c85a5600a1bb331d55efee50361be81547989ec4fb.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5000 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"23⤵
- Executes dropped EXE
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE24⤵
- Executes dropped EXE
- Modifies registry class
PID:4312 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"25⤵
- Executes dropped EXE
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
PID:1036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3504 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"29⤵
- Executes dropped EXE
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE30⤵
- Executes dropped EXE
- Modifies registry class
PID:1080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"31⤵
- Executes dropped EXE
PID:3856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"33⤵
- Executes dropped EXE
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"35⤵
- Executes dropped EXE
PID:788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE36⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3556 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE40⤵
- Executes dropped EXE
- Modifies registry class
PID:4272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"41⤵
- Executes dropped EXE
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE44⤵
- Executes dropped EXE
PID:2528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"45⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE46⤵
- Executes dropped EXE
- Modifies registry class
PID:2268 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"47⤵
- Executes dropped EXE
PID:4788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE48⤵
- Executes dropped EXE
PID:4356 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"49⤵
- Executes dropped EXE
PID:4748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"51⤵
- Executes dropped EXE
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"53⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE54⤵
- Executes dropped EXE
PID:2536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"55⤵
- Executes dropped EXE
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3940 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"59⤵
- Executes dropped EXE
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"61⤵
- Executes dropped EXE
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:856 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE64⤵
- Executes dropped EXE
- Modifies registry class
PID:4336 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"65⤵PID:3932
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE66⤵
- Checks computer location settings
- Drops file in Windows directory
PID:1780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE68⤵
- Checks computer location settings
PID:1832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"69⤵
- Drops file in Windows directory
PID:4700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE70⤵PID:2008
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"71⤵
- System Location Discovery: System Language Discovery
PID:4372 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE72⤵PID:3248
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"73⤵PID:3624
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE74⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1304 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"75⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE76⤵
- Checks computer location settings
PID:4544 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE78⤵
- Drops file in Windows directory
- Modifies registry class
PID:3384 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"79⤵PID:848
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE80⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"81⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE82⤵PID:2608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"83⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE84⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"85⤵
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE86⤵
- Drops file in Windows directory
- Modifies registry class
PID:3524 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"87⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE88⤵
- Checks computer location settings
PID:4804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"89⤵PID:3936
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE90⤵
- Drops file in Windows directory
- Modifies registry class
PID:3808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"91⤵
- System Location Discovery: System Language Discovery
PID:4716 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE92⤵
- Drops file in Windows directory
- Modifies registry class
PID:3484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"93⤵PID:4764
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE94⤵
- Modifies registry class
PID:2028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"95⤵
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE96⤵
- Checks computer location settings
PID:3440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"97⤵
- System Location Discovery: System Language Discovery
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE98⤵
- Drops file in Windows directory
PID:2376 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"99⤵
- System Location Discovery: System Language Discovery
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE100⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"101⤵
- Drops file in Windows directory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE102⤵
- Checks computer location settings
- Modifies registry class
PID:3904 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"103⤵PID:4052
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE104⤵
- Checks computer location settings
PID:3960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"105⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE106⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"107⤵PID:3728
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE108⤵PID:2160
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"109⤵PID:1456
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE110⤵
- Checks computer location settings
- Modifies registry class
PID:2272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE112⤵PID:1628
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"113⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE114⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"115⤵
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE116⤵
- Checks computer location settings
PID:3188 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE118⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:640 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"119⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE120⤵PID:1704
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE"121⤵PID:5064
-
C:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\6FB6C6~1.EXE122⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2948
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-