Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
38s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 05:45
Static task
static1
Behavioral task
behavioral1
Sample
c21376b5312e703d05d23a9b502adbbbe5664f72ca744cf40d28aeb7f9a23aed.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c21376b5312e703d05d23a9b502adbbbe5664f72ca744cf40d28aeb7f9a23aed.exe
Resource
win10v2004-20220812-en
General
-
Target
c21376b5312e703d05d23a9b502adbbbe5664f72ca744cf40d28aeb7f9a23aed.exe
-
Size
178KB
-
MD5
5e27289e555900ac8239df5e2de75643
-
SHA1
9cca801fecca11f210c671b427e99d7163c3853b
-
SHA256
c21376b5312e703d05d23a9b502adbbbe5664f72ca744cf40d28aeb7f9a23aed
-
SHA512
3f404d364987b49988dcf3bff17a627802b62ab86922d935628807b505d6c22f2b7b4abd0eea6a8d3d6d4401b2972ab51d534af82a0f1edf2aa43a77448e97e6
-
SSDEEP
3072:DLhJ3a9u0owgCEef0YkjQLd5B+F4gFyVUUEmAfnWP5n9Y:/3l3es25sFtXmSM9
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1608 wuauolts.exe 972 wuauolts.exe 624 wuauolts.exe 1308 wuauolts.exe 268 wuauolts.exe 892 wuauolts.exe 1688 wuauolts.exe 988 wuauolts.exe 1912 wuauolts.exe 1180 wuauolts.exe 1172 wuauolts.exe 1640 wuauolts.exe 984 wuauolts.exe 1764 wuauolts.exe 432 wuauolts.exe 1916 wuauolts.exe 896 wuauolts.exe 1652 wuauolts.exe 944 wuauolts.exe 900 wuauolts.exe 1792 wuauolts.exe 1628 wuauolts.exe 1092 wuauolts.exe 1524 wuauolts.exe 1220 wuauolts.exe 576 wuauolts.exe 1984 wuauolts.exe 1644 wuauolts.exe 1692 wuauolts.exe 364 wuauolts.exe 1588 wuauolts.exe 1556 wuauolts.exe 1120 wuauolts.exe 276 wuauolts.exe 1908 wuauolts.exe 1348 wuauolts.exe 1200 wuauolts.exe 1996 wuauolts.exe 304 wuauolts.exe 1380 wuauolts.exe 1568 wuauolts.exe 1868 wuauolts.exe 1564 wuauolts.exe 1388 wuauolts.exe 588 wuauolts.exe 772 wuauolts.exe 564 wuauolts.exe 1376 wuauolts.exe 864 wuauolts.exe 1964 wuauolts.exe 452 wuauolts.exe 1892 wuauolts.exe 952 wuauolts.exe 2084 wuauolts.exe 2128 wuauolts.exe 2172 wuauolts.exe 2208 wuauolts.exe 2252 wuauolts.exe 2300 wuauolts.exe 2324 wuauolts.exe 2348 wuauolts.exe 2372 wuauolts.exe 2396 wuauolts.exe 2420 wuauolts.exe -
Loads dropped DLL 64 IoCs
pid Process 1000 c21376b5312e703d05d23a9b502adbbbe5664f72ca744cf40d28aeb7f9a23aed.exe 1000 c21376b5312e703d05d23a9b502adbbbe5664f72ca744cf40d28aeb7f9a23aed.exe 1608 wuauolts.exe 1608 wuauolts.exe 972 wuauolts.exe 972 wuauolts.exe 624 wuauolts.exe 624 wuauolts.exe 1308 wuauolts.exe 1308 wuauolts.exe 268 wuauolts.exe 268 wuauolts.exe 892 wuauolts.exe 892 wuauolts.exe 1688 wuauolts.exe 1688 wuauolts.exe 988 wuauolts.exe 988 wuauolts.exe 1912 wuauolts.exe 1912 wuauolts.exe 1180 wuauolts.exe 1180 wuauolts.exe 1172 wuauolts.exe 1172 wuauolts.exe 1640 wuauolts.exe 1640 wuauolts.exe 984 wuauolts.exe 984 wuauolts.exe 1764 wuauolts.exe 1764 wuauolts.exe 432 wuauolts.exe 432 wuauolts.exe 1916 wuauolts.exe 1916 wuauolts.exe 896 wuauolts.exe 896 wuauolts.exe 1652 wuauolts.exe 1652 wuauolts.exe 944 wuauolts.exe 944 wuauolts.exe 900 wuauolts.exe 900 wuauolts.exe 1792 wuauolts.exe 1792 wuauolts.exe 1628 wuauolts.exe 1628 wuauolts.exe 1092 wuauolts.exe 1092 wuauolts.exe 1524 wuauolts.exe 1524 wuauolts.exe 1220 wuauolts.exe 1220 wuauolts.exe 576 wuauolts.exe 576 wuauolts.exe 1984 wuauolts.exe 1984 wuauolts.exe 1644 wuauolts.exe 1644 wuauolts.exe 1692 wuauolts.exe 1692 wuauolts.exe 364 wuauolts.exe 364 wuauolts.exe 1588 wuauolts.exe 1588 wuauolts.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\f: wuauolts.exe File opened (read-only) \??\o: wuauolts.exe File opened (read-only) \??\t: wuauolts.exe File opened (read-only) \??\u: wuauolts.exe File opened (read-only) \??\v: wuauolts.exe File opened (read-only) \??\n: wuauolts.exe File opened (read-only) \??\o: wuauolts.exe File opened (read-only) \??\v: wuauolts.exe File opened (read-only) \??\p: wuauolts.exe File opened (read-only) \??\r: wuauolts.exe File opened (read-only) \??\u: wuauolts.exe File opened (read-only) \??\x: wuauolts.exe File opened (read-only) \??\s: wuauolts.exe File opened (read-only) \??\q: wuauolts.exe File opened (read-only) \??\s: wuauolts.exe File opened (read-only) \??\v: wuauolts.exe File opened (read-only) \??\h: wuauolts.exe File opened (read-only) \??\o: wuauolts.exe File opened (read-only) \??\s: wuauolts.exe File opened (read-only) \??\r: wuauolts.exe File opened (read-only) \??\s: wuauolts.exe File opened (read-only) \??\j: wuauolts.exe File opened (read-only) \??\i: wuauolts.exe File opened (read-only) \??\n: wuauolts.exe File opened (read-only) \??\y: wuauolts.exe File opened (read-only) \??\w: wuauolts.exe File opened (read-only) \??\n: wuauolts.exe File opened (read-only) \??\l: wuauolts.exe File opened (read-only) \??\j: wuauolts.exe File opened (read-only) \??\i: wuauolts.exe File opened (read-only) \??\v: wuauolts.exe File opened (read-only) \??\t: wuauolts.exe File opened (read-only) \??\r: wuauolts.exe File opened (read-only) \??\e: wuauolts.exe File opened (read-only) \??\i: wuauolts.exe File opened (read-only) \??\p: wuauolts.exe File opened (read-only) \??\s: wuauolts.exe File opened (read-only) \??\m: wuauolts.exe File opened (read-only) \??\n: wuauolts.exe File opened (read-only) \??\n: wuauolts.exe File opened (read-only) \??\t: wuauolts.exe File opened (read-only) \??\g: wuauolts.exe File opened (read-only) \??\n: wuauolts.exe File opened (read-only) \??\l: wuauolts.exe File opened (read-only) \??\x: wuauolts.exe File opened (read-only) \??\r: wuauolts.exe File opened (read-only) \??\s: wuauolts.exe File opened (read-only) \??\m: wuauolts.exe File opened (read-only) \??\h: wuauolts.exe File opened (read-only) \??\z: wuauolts.exe File opened (read-only) \??\j: wuauolts.exe File opened (read-only) \??\i: wuauolts.exe File opened (read-only) \??\o: wuauolts.exe File opened (read-only) \??\j: wuauolts.exe File opened (read-only) \??\y: wuauolts.exe File opened (read-only) \??\t: wuauolts.exe File opened (read-only) \??\o: wuauolts.exe File opened (read-only) \??\q: wuauolts.exe File opened (read-only) \??\z: wuauolts.exe File opened (read-only) \??\l: wuauolts.exe File opened (read-only) \??\o: wuauolts.exe File opened (read-only) \??\n: wuauolts.exe File opened (read-only) \??\s: wuauolts.exe File opened (read-only) \??\z: wuauolts.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1000 c21376b5312e703d05d23a9b502adbbbe5664f72ca744cf40d28aeb7f9a23aed.exe 1608 wuauolts.exe 972 wuauolts.exe 624 wuauolts.exe 1308 wuauolts.exe 268 wuauolts.exe 892 wuauolts.exe 1688 wuauolts.exe 988 wuauolts.exe 1912 wuauolts.exe 1180 wuauolts.exe 1172 wuauolts.exe 1640 wuauolts.exe 984 wuauolts.exe 1764 wuauolts.exe 432 wuauolts.exe 1916 wuauolts.exe 896 wuauolts.exe 1652 wuauolts.exe 944 wuauolts.exe 900 wuauolts.exe 1792 wuauolts.exe 1628 wuauolts.exe 1092 wuauolts.exe 1524 wuauolts.exe 1220 wuauolts.exe 576 wuauolts.exe 1984 wuauolts.exe 1644 wuauolts.exe 1692 wuauolts.exe 364 wuauolts.exe 1588 wuauolts.exe 1556 wuauolts.exe 1120 wuauolts.exe 276 wuauolts.exe 1908 wuauolts.exe 1348 wuauolts.exe 1200 wuauolts.exe 1996 wuauolts.exe 304 wuauolts.exe 1380 wuauolts.exe 1568 wuauolts.exe 1868 wuauolts.exe 1564 wuauolts.exe 1388 wuauolts.exe 588 wuauolts.exe 772 wuauolts.exe 564 wuauolts.exe 1376 wuauolts.exe 864 wuauolts.exe 1964 wuauolts.exe 452 wuauolts.exe 1892 wuauolts.exe 952 wuauolts.exe 2084 wuauolts.exe 2128 wuauolts.exe 2172 wuauolts.exe 2208 wuauolts.exe 2252 wuauolts.exe 2300 wuauolts.exe 2324 wuauolts.exe 2348 wuauolts.exe 2372 wuauolts.exe 2396 wuauolts.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1000 wrote to memory of 1608 1000 c21376b5312e703d05d23a9b502adbbbe5664f72ca744cf40d28aeb7f9a23aed.exe 27 PID 1000 wrote to memory of 1608 1000 c21376b5312e703d05d23a9b502adbbbe5664f72ca744cf40d28aeb7f9a23aed.exe 27 PID 1000 wrote to memory of 1608 1000 c21376b5312e703d05d23a9b502adbbbe5664f72ca744cf40d28aeb7f9a23aed.exe 27 PID 1000 wrote to memory of 1608 1000 c21376b5312e703d05d23a9b502adbbbe5664f72ca744cf40d28aeb7f9a23aed.exe 27 PID 1608 wrote to memory of 972 1608 wuauolts.exe 28 PID 1608 wrote to memory of 972 1608 wuauolts.exe 28 PID 1608 wrote to memory of 972 1608 wuauolts.exe 28 PID 1608 wrote to memory of 972 1608 wuauolts.exe 28 PID 972 wrote to memory of 624 972 wuauolts.exe 29 PID 972 wrote to memory of 624 972 wuauolts.exe 29 PID 972 wrote to memory of 624 972 wuauolts.exe 29 PID 972 wrote to memory of 624 972 wuauolts.exe 29 PID 624 wrote to memory of 1308 624 wuauolts.exe 30 PID 624 wrote to memory of 1308 624 wuauolts.exe 30 PID 624 wrote to memory of 1308 624 wuauolts.exe 30 PID 624 wrote to memory of 1308 624 wuauolts.exe 30 PID 1308 wrote to memory of 268 1308 wuauolts.exe 31 PID 1308 wrote to memory of 268 1308 wuauolts.exe 31 PID 1308 wrote to memory of 268 1308 wuauolts.exe 31 PID 1308 wrote to memory of 268 1308 wuauolts.exe 31 PID 268 wrote to memory of 892 268 wuauolts.exe 32 PID 268 wrote to memory of 892 268 wuauolts.exe 32 PID 268 wrote to memory of 892 268 wuauolts.exe 32 PID 268 wrote to memory of 892 268 wuauolts.exe 32 PID 892 wrote to memory of 1688 892 wuauolts.exe 33 PID 892 wrote to memory of 1688 892 wuauolts.exe 33 PID 892 wrote to memory of 1688 892 wuauolts.exe 33 PID 892 wrote to memory of 1688 892 wuauolts.exe 33 PID 1688 wrote to memory of 988 1688 wuauolts.exe 34 PID 1688 wrote to memory of 988 1688 wuauolts.exe 34 PID 1688 wrote to memory of 988 1688 wuauolts.exe 34 PID 1688 wrote to memory of 988 1688 wuauolts.exe 34 PID 988 wrote to memory of 1912 988 wuauolts.exe 35 PID 988 wrote to memory of 1912 988 wuauolts.exe 35 PID 988 wrote to memory of 1912 988 wuauolts.exe 35 PID 988 wrote to memory of 1912 988 wuauolts.exe 35 PID 1912 wrote to memory of 1180 1912 wuauolts.exe 36 PID 1912 wrote to memory of 1180 1912 wuauolts.exe 36 PID 1912 wrote to memory of 1180 1912 wuauolts.exe 36 PID 1912 wrote to memory of 1180 1912 wuauolts.exe 36 PID 1180 wrote to memory of 1172 1180 wuauolts.exe 37 PID 1180 wrote to memory of 1172 1180 wuauolts.exe 37 PID 1180 wrote to memory of 1172 1180 wuauolts.exe 37 PID 1180 wrote to memory of 1172 1180 wuauolts.exe 37 PID 1172 wrote to memory of 1640 1172 wuauolts.exe 38 PID 1172 wrote to memory of 1640 1172 wuauolts.exe 38 PID 1172 wrote to memory of 1640 1172 wuauolts.exe 38 PID 1172 wrote to memory of 1640 1172 wuauolts.exe 38 PID 1640 wrote to memory of 984 1640 wuauolts.exe 39 PID 1640 wrote to memory of 984 1640 wuauolts.exe 39 PID 1640 wrote to memory of 984 1640 wuauolts.exe 39 PID 1640 wrote to memory of 984 1640 wuauolts.exe 39 PID 984 wrote to memory of 1764 984 wuauolts.exe 40 PID 984 wrote to memory of 1764 984 wuauolts.exe 40 PID 984 wrote to memory of 1764 984 wuauolts.exe 40 PID 984 wrote to memory of 1764 984 wuauolts.exe 40 PID 1764 wrote to memory of 432 1764 wuauolts.exe 41 PID 1764 wrote to memory of 432 1764 wuauolts.exe 41 PID 1764 wrote to memory of 432 1764 wuauolts.exe 41 PID 1764 wrote to memory of 432 1764 wuauolts.exe 41 PID 432 wrote to memory of 1916 432 wuauolts.exe 42 PID 432 wrote to memory of 1916 432 wuauolts.exe 42 PID 432 wrote to memory of 1916 432 wuauolts.exe 42 PID 432 wrote to memory of 1916 432 wuauolts.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\c21376b5312e703d05d23a9b502adbbbe5664f72ca744cf40d28aeb7f9a23aed.exe"C:\Users\Admin\AppData\Local\Temp\c21376b5312e703d05d23a9b502adbbbe5664f72ca744cf40d28aeb7f9a23aed.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:972 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:268 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:984 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1916 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:896 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1652 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:944 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:900 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1792 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1628 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1092 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1524 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1220 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:576 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1984 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1644 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1692 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:364 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1588 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe33⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1556 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe34⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1120 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe35⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:276 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe36⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1908 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1348 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe38⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1200 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1996 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:304 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe41⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1380 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe42⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1568 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe43⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1868 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe44⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1564 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe45⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1388 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe46⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:588 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe47⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:772
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe1⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:564 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1376 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe3⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:864 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe4⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1964 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe5⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:452 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1892 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe7⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:952 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2084 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe9⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2128 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe10⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2172 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe11⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2208 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe12⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2252 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe13⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2300 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe14⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2324 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2348 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe16⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2372 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe17⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2396 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe18⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops file in System32 directory
PID:2420 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe19⤵
- Enumerates connected drives
PID:2444 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe20⤵PID:2464
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe21⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:2484 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe22⤵PID:2504
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe23⤵
- Drops file in System32 directory
PID:2524 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe24⤵PID:2544
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe25⤵PID:2564
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe26⤵PID:2584
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe27⤵
- Drops file in System32 directory
PID:2604 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe28⤵PID:2624
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe29⤵
- Drops file in System32 directory
PID:2644 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe30⤵PID:2676
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe31⤵
- Enumerates connected drives
PID:2708 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe32⤵PID:2740
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe33⤵PID:2772
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe34⤵
- Drops file in System32 directory
PID:2812 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe35⤵PID:2844
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe36⤵PID:2876
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe37⤵PID:2912
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe38⤵
- Enumerates connected drives
PID:2948 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe39⤵PID:2984
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe40⤵PID:3020
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe41⤵PID:3056
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe42⤵
- Enumerates connected drives
PID:2072 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe43⤵
- Drops file in System32 directory
PID:2116 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe44⤵
- Enumerates connected drives
PID:2180 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe45⤵
- Enumerates connected drives
PID:2236 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe46⤵PID:2288
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe47⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe48⤵
- Enumerates connected drives
PID:2432 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe49⤵PID:2512
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe50⤵PID:2592
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe51⤵PID:2668
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe52⤵PID:2728
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe53⤵PID:2792
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe54⤵PID:2832
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe55⤵PID:2888
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe56⤵PID:2932
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe57⤵PID:3000
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe58⤵PID:3052
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe59⤵
- Enumerates connected drives
PID:2092 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe60⤵PID:2148
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe61⤵PID:2220
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe62⤵
- Enumerates connected drives
PID:2280 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe63⤵
- Drops file in System32 directory
PID:2336 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe64⤵PID:2408
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe65⤵
- Drops file in System32 directory
PID:2472 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe66⤵
- Enumerates connected drives
PID:2552 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe67⤵
- Drops file in System32 directory
PID:2632 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe68⤵PID:2688
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe69⤵PID:2748
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe70⤵PID:2820
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe71⤵PID:2896
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe72⤵
- Enumerates connected drives
PID:2972 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe73⤵
- Drops file in System32 directory
PID:3068 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe74⤵PID:2140
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe75⤵PID:2224
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe76⤵
- Drops file in System32 directory
PID:2380 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe77⤵PID:2656
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe78⤵
- Enumerates connected drives
PID:2804 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe79⤵
- Drops file in System32 directory
PID:2964 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe80⤵
- Enumerates connected drives
- Drops file in System32 directory
PID:3032 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe81⤵PID:2160
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe82⤵PID:2492
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe83⤵
- Drops file in System32 directory
PID:2780 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe84⤵
- Enumerates connected drives
PID:2980 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe85⤵
- Drops file in System32 directory
PID:2104 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe86⤵
- Enumerates connected drives
PID:2616 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe87⤵PID:2920
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe88⤵PID:2264
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe89⤵PID:3028
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe90⤵
- Drops file in System32 directory
PID:2856 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe91⤵PID:2868
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe92⤵
- Enumerates connected drives
PID:3084 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe93⤵PID:3120
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe94⤵PID:3156
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe95⤵
- Enumerates connected drives
PID:3188 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe96⤵PID:3216
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe97⤵PID:3252
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe98⤵PID:3296
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe99⤵PID:3332
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe100⤵PID:3364
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe101⤵PID:3404
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe102⤵PID:3424
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe103⤵PID:3444
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe104⤵PID:3464
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe105⤵PID:3484
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe106⤵
- Drops file in System32 directory
PID:3504 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe107⤵
- Enumerates connected drives
PID:3532 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe108⤵PID:3564
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe109⤵
- Drops file in System32 directory
PID:3604 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe110⤵PID:3640
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe111⤵
- Drops file in System32 directory
PID:3672 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe112⤵PID:3708
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe113⤵
- Drops file in System32 directory
PID:3748 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe114⤵PID:3780
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe115⤵
- Enumerates connected drives
PID:3816 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe116⤵
- Drops file in System32 directory
PID:3852 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe117⤵PID:3884
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe118⤵PID:3912
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe119⤵PID:3944
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe120⤵PID:3980
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe121⤵PID:4016
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe122⤵
- Drops file in System32 directory
PID:4048
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-