Analysis
-
max time kernel
131s -
max time network
122s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
06/03/2022, 04:22
Static task
static1
Behavioral task
behavioral1
Sample
88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe
Resource
win10v2004-en-20220113
General
-
Target
88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe
-
Size
678KB
-
MD5
c627f3efbd8ac9d105bbbbabede03292
-
SHA1
6da7954690a43c7355b494f069afab03c41f2550
-
SHA256
88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f
-
SHA512
80c569c83412f4ed8257de33eb5b77d0cc2e046c8c9a3dd1ff4404cc2f6309a0cf2f1cb1cb0bef13e445d9f2ab94a864225375d1c11156d52b859bbfa041cc7b
Malware Config
Extracted
\??\Z:\Boot\Recovery_Instructions.html
Signatures
-
MedusaLocker
Ransomware with several variants first seen in September 2019.
-
MedusaLocker Payload 2 IoCs
resource yara_rule behavioral1/files/0x0008000000012228-56.dat family_medusalocker behavioral1/files/0x0008000000012228-57.dat family_medusalocker -
Deletes shadow copies 2 TTPs
Ransomware often targets backup files to inhibit system recovery.
-
Executes dropped EXE 1 IoCs
pid Process 548 svhost.exe -
Modifies extensions of user files 1 IoCs
Ransomware generally changes the extension on encrypted files.
description ioc Process File renamed C:\Users\Admin\Pictures\WaitJoin.crw => C:\Users\Admin\Pictures\WaitJoin.crw.ReadInstructions 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification \??\Z:\$RECYCLE.BIN\S-1-5-21-2329389628-4064185017-3901522362-1000\desktop.ini 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\T: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\F: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\H: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\L: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\S: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\W: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\B: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\G: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\R: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\M: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\N: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\O: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\Q: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\Z: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\I: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\J: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\K: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\V: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\X: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\Y: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\A: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\E: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe File opened (read-only) \??\U: 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Interacts with shadow copies 2 TTPs 3 IoCs
Shadow copies are often targeted by ransomware to inhibit system recovery.
pid Process 1660 vssadmin.exe 1520 vssadmin.exe 964 vssadmin.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe -
Suspicious use of AdjustPrivilegeToken 63 IoCs
description pid Process Token: SeBackupPrivilege 452 vssvc.exe Token: SeRestorePrivilege 452 vssvc.exe Token: SeAuditPrivilege 452 vssvc.exe Token: SeIncreaseQuotaPrivilege 824 wmic.exe Token: SeSecurityPrivilege 824 wmic.exe Token: SeTakeOwnershipPrivilege 824 wmic.exe Token: SeLoadDriverPrivilege 824 wmic.exe Token: SeSystemProfilePrivilege 824 wmic.exe Token: SeSystemtimePrivilege 824 wmic.exe Token: SeProfSingleProcessPrivilege 824 wmic.exe Token: SeIncBasePriorityPrivilege 824 wmic.exe Token: SeCreatePagefilePrivilege 824 wmic.exe Token: SeBackupPrivilege 824 wmic.exe Token: SeRestorePrivilege 824 wmic.exe Token: SeShutdownPrivilege 824 wmic.exe Token: SeDebugPrivilege 824 wmic.exe Token: SeSystemEnvironmentPrivilege 824 wmic.exe Token: SeRemoteShutdownPrivilege 824 wmic.exe Token: SeUndockPrivilege 824 wmic.exe Token: SeManageVolumePrivilege 824 wmic.exe Token: 33 824 wmic.exe Token: 34 824 wmic.exe Token: 35 824 wmic.exe Token: SeIncreaseQuotaPrivilege 1672 wmic.exe Token: SeSecurityPrivilege 1672 wmic.exe Token: SeTakeOwnershipPrivilege 1672 wmic.exe Token: SeLoadDriverPrivilege 1672 wmic.exe Token: SeSystemProfilePrivilege 1672 wmic.exe Token: SeSystemtimePrivilege 1672 wmic.exe Token: SeProfSingleProcessPrivilege 1672 wmic.exe Token: SeIncBasePriorityPrivilege 1672 wmic.exe Token: SeCreatePagefilePrivilege 1672 wmic.exe Token: SeBackupPrivilege 1672 wmic.exe Token: SeRestorePrivilege 1672 wmic.exe Token: SeShutdownPrivilege 1672 wmic.exe Token: SeDebugPrivilege 1672 wmic.exe Token: SeSystemEnvironmentPrivilege 1672 wmic.exe Token: SeRemoteShutdownPrivilege 1672 wmic.exe Token: SeUndockPrivilege 1672 wmic.exe Token: SeManageVolumePrivilege 1672 wmic.exe Token: 33 1672 wmic.exe Token: 34 1672 wmic.exe Token: 35 1672 wmic.exe Token: SeIncreaseQuotaPrivilege 1716 wmic.exe Token: SeSecurityPrivilege 1716 wmic.exe Token: SeTakeOwnershipPrivilege 1716 wmic.exe Token: SeLoadDriverPrivilege 1716 wmic.exe Token: SeSystemProfilePrivilege 1716 wmic.exe Token: SeSystemtimePrivilege 1716 wmic.exe Token: SeProfSingleProcessPrivilege 1716 wmic.exe Token: SeIncBasePriorityPrivilege 1716 wmic.exe Token: SeCreatePagefilePrivilege 1716 wmic.exe Token: SeBackupPrivilege 1716 wmic.exe Token: SeRestorePrivilege 1716 wmic.exe Token: SeShutdownPrivilege 1716 wmic.exe Token: SeDebugPrivilege 1716 wmic.exe Token: SeSystemEnvironmentPrivilege 1716 wmic.exe Token: SeRemoteShutdownPrivilege 1716 wmic.exe Token: SeUndockPrivilege 1716 wmic.exe Token: SeManageVolumePrivilege 1716 wmic.exe Token: 33 1716 wmic.exe Token: 34 1716 wmic.exe Token: 35 1716 wmic.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 780 wrote to memory of 964 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 27 PID 780 wrote to memory of 964 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 27 PID 780 wrote to memory of 964 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 27 PID 780 wrote to memory of 964 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 27 PID 780 wrote to memory of 824 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 30 PID 780 wrote to memory of 824 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 30 PID 780 wrote to memory of 824 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 30 PID 780 wrote to memory of 824 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 30 PID 780 wrote to memory of 1660 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 32 PID 780 wrote to memory of 1660 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 32 PID 780 wrote to memory of 1660 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 32 PID 780 wrote to memory of 1660 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 32 PID 780 wrote to memory of 1672 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 34 PID 780 wrote to memory of 1672 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 34 PID 780 wrote to memory of 1672 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 34 PID 780 wrote to memory of 1672 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 34 PID 780 wrote to memory of 1520 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 36 PID 780 wrote to memory of 1520 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 36 PID 780 wrote to memory of 1520 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 36 PID 780 wrote to memory of 1520 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 36 PID 780 wrote to memory of 1716 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 38 PID 780 wrote to memory of 1716 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 38 PID 780 wrote to memory of 1716 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 38 PID 780 wrote to memory of 1716 780 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe 38 PID 1596 wrote to memory of 548 1596 taskeng.exe 42 PID 1596 wrote to memory of 548 1596 taskeng.exe 42 PID 1596 wrote to memory of 548 1596 taskeng.exe 42 PID 1596 wrote to memory of 548 1596 taskeng.exe 42 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLinkedConnections = "1" 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" 88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe"C:\Users\Admin\AppData\Local\Temp\88e0a638db0258409c7458b15634be4cbefe4f6438ee39ab61c2699c18997c5f.exe"1⤵
- Modifies extensions of user files
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:780 -
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:964
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:824
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1660
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1672
-
-
C:\Windows\SysWOW64\vssadmin.exevssadmin.exe Delete Shadows /All /Quiet2⤵
- Interacts with shadow copies
PID:1520
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic.exe SHADOWCOPY /nointeractive2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:452
-
C:\Windows\system32\taskeng.exetaskeng.exe {E9278466-45A5-4FE5-ADB1-EB7C8B4BC9C1} S-1-5-21-2329389628-4064185017-3901522362-1000:QSKGHMYQ\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Roaming\svhost.exeC:\Users\Admin\AppData\Roaming\svhost.exe2⤵
- Executes dropped EXE
PID:548
-