Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
295s -
max time network
315s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 18:38
Static task
static1
Behavioral task
behavioral1
Sample
9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe
Resource
win10v2004-20221111-en
General
-
Target
9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe
-
Size
52KB
-
MD5
d6bf563c9166646e1aafff6bc67a9110
-
SHA1
c229e525579c2354f20f2ed4437043813d6f69e4
-
SHA256
9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49
-
SHA512
9d3953dd9e8417ebe4d04df13c15698a64926ad3b9c6a8bdf2a2caeaa6f659c1d8c5a6d5ffe9346d631c569df2a62e4625b5630b77927da825d6370f22cacf32
-
SSDEEP
768:yixLu5hwyAuZ6w6xTxn3HIbPYXi7FLGA8KCppW8lFZsTwQM4P:yiRshIuZMxlIbgXi7FqzT3lFWU
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4860 9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe 4648 svchoct.exe 2316 svchoct.exe 2192 svchoct.exe 3864 svchoct.exe 3040 svchoct.exe 1524 svchoct.exe 2212 svchoct.exe 1712 svchoct.exe 5056 svchoct.exe 3480 svchoct.exe 1616 svchoct.exe 2264 svchoct.exe 4660 svchoct.exe 2704 svchoct.exe 3836 svchoct.exe 1920 svchoct.exe 4656 svchoct.exe 4352 svchoct.exe 1768 svchoct.exe 2184 svchoct.exe 2836 svchoct.exe 1680 svchoct.exe 2256 svchoct.exe 2424 svchoct.exe 4576 svchoct.exe 5016 svchoct.exe 1332 svchoct.exe 3032 svchoct.exe 4852 svchoct.exe 3548 svchoct.exe 2948 svchoct.exe 4072 svchoct.exe 2444 svchoct.exe 2244 svchoct.exe 260 svchoct.exe 2152 svchoct.exe 4112 svchoct.exe 3964 svchoct.exe 2688 svchoct.exe 1080 svchoct.exe 3004 svchoct.exe 1168 svchoct.exe 4780 svchoct.exe 3212 svchoct.exe 4220 svchoct.exe 224 svchoct.exe 212 svchoct.exe 3892 svchoct.exe 1236 svchoct.exe 4796 svchoct.exe 3912 svchoct.exe 1212 svchoct.exe 3276 svchoct.exe 3752 svchoct.exe 4988 svchoct.exe 776 svchoct.exe 4032 svchoct.exe 3956 svchoct.exe 4836 svchoct.exe 4224 svchoct.exe 2656 svchoct.exe 3136 svchoct.exe 2648 svchoct.exe -
resource yara_rule behavioral2/memory/4860-135-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4860-136-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4860-137-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4860-138-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2316-154-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3864-163-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1524-172-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1712-189-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3480-190-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2264-199-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2704-216-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1920-217-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4352-222-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2184-231-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1680-240-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2424-249-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/5016-258-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3032-267-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3548-276-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4072-285-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2244-294-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2152-303-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3964-312-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1080-321-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1168-330-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3212-339-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/224-348-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3892-357-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4796-367-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1212-375-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3752-384-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/776-393-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3956-402-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4224-411-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3136-419-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1888-424-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4692-429-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3540-434-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3080-439-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2268-444-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1248-449-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2208-454-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2192-459-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4996-464-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2496-469-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3500-474-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3920-479-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/1636-484-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4580-489-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2000-494-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/5080-499-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/448-504-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2948-509-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4432-514-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3424-519-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4752-524-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4760-529-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2332-534-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/4144-539-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2304-544-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/2404-549-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3720-554-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/212-559-0x0000000000400000-0x000000000044B000-memory.dmp upx behavioral2/memory/3856-564-0x0000000000400000-0x000000000044B000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe 9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File created C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe File opened for modification C:\Windows\SysWOW64\svchoct.exe svchoct.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 3688 set thread context of 4860 3688 9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe 81 PID 4648 set thread context of 2316 4648 svchoct.exe 83 PID 2192 set thread context of 3864 2192 svchoct.exe 86 PID 3040 set thread context of 1524 3040 svchoct.exe 88 PID 2212 set thread context of 1712 2212 svchoct.exe 91 PID 5056 set thread context of 3480 5056 svchoct.exe 93 PID 1616 set thread context of 2264 1616 svchoct.exe 95 PID 4660 set thread context of 2704 4660 svchoct.exe 97 PID 3836 set thread context of 1920 3836 svchoct.exe 101 PID 4656 set thread context of 4352 4656 svchoct.exe 100 PID 1768 set thread context of 2184 1768 svchoct.exe 103 PID 2836 set thread context of 1680 2836 svchoct.exe 105 PID 2256 set thread context of 2424 2256 svchoct.exe 107 PID 4576 set thread context of 5016 4576 svchoct.exe 109 PID 1332 set thread context of 3032 1332 svchoct.exe 111 PID 4852 set thread context of 3548 4852 svchoct.exe 113 PID 2948 set thread context of 4072 2948 svchoct.exe 115 PID 2444 set thread context of 2244 2444 svchoct.exe 117 PID 260 set thread context of 2152 260 svchoct.exe 119 PID 4112 set thread context of 3964 4112 svchoct.exe 121 PID 2688 set thread context of 1080 2688 svchoct.exe 123 PID 3004 set thread context of 1168 3004 svchoct.exe 125 PID 4780 set thread context of 3212 4780 svchoct.exe 127 PID 4220 set thread context of 224 4220 svchoct.exe 129 PID 212 set thread context of 3892 212 svchoct.exe 131 PID 1236 set thread context of 4796 1236 svchoct.exe 133 PID 3912 set thread context of 1212 3912 svchoct.exe 135 PID 3276 set thread context of 3752 3276 svchoct.exe 137 PID 4988 set thread context of 776 4988 svchoct.exe 139 PID 4032 set thread context of 3956 4032 svchoct.exe 141 PID 4836 set thread context of 4224 4836 svchoct.exe 143 PID 2656 set thread context of 3136 2656 svchoct.exe 145 PID 2648 set thread context of 1888 2648 svchoct.exe 147 PID 4536 set thread context of 4692 4536 svchoct.exe 149 PID 4596 set thread context of 3540 4596 svchoct.exe 151 PID 3900 set thread context of 3080 3900 svchoct.exe 153 PID 516 set thread context of 2268 516 svchoct.exe 155 PID 2772 set thread context of 1248 2772 svchoct.exe 157 PID 1508 set thread context of 2208 1508 svchoct.exe 159 PID 2400 set thread context of 2192 2400 svchoct.exe 161 PID 2220 set thread context of 4996 2220 svchoct.exe 163 PID 3840 set thread context of 2496 3840 svchoct.exe 165 PID 1768 set thread context of 3500 1768 svchoct.exe 167 PID 1540 set thread context of 3920 1540 svchoct.exe 169 PID 1076 set thread context of 1636 1076 svchoct.exe 171 PID 1140 set thread context of 4580 1140 svchoct.exe 173 PID 3336 set thread context of 2000 3336 svchoct.exe 175 PID 3608 set thread context of 5080 3608 svchoct.exe 177 PID 2412 set thread context of 448 2412 svchoct.exe 179 PID 1220 set thread context of 2948 1220 svchoct.exe 181 PID 3696 set thread context of 4432 3696 svchoct.exe 183 PID 4448 set thread context of 3424 4448 svchoct.exe 185 PID 1376 set thread context of 4752 1376 svchoct.exe 187 PID 4112 set thread context of 4760 4112 svchoct.exe 189 PID 432 set thread context of 2332 432 svchoct.exe 191 PID 4756 set thread context of 4144 4756 svchoct.exe 193 PID 3048 set thread context of 2304 3048 svchoct.exe 195 PID 3428 set thread context of 2404 3428 svchoct.exe 197 PID 320 set thread context of 3720 320 svchoct.exe 199 PID 4560 set thread context of 212 4560 svchoct.exe 201 PID 3824 set thread context of 3856 3824 svchoct.exe 203 PID 1484 set thread context of 3272 1484 svchoct.exe 205 PID 2548 set thread context of 1088 2548 svchoct.exe 207 PID 3276 set thread context of 4916 3276 svchoct.exe 209 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3688 wrote to memory of 4860 3688 9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe 81 PID 3688 wrote to memory of 4860 3688 9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe 81 PID 3688 wrote to memory of 4860 3688 9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe 81 PID 3688 wrote to memory of 4860 3688 9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe 81 PID 3688 wrote to memory of 4860 3688 9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe 81 PID 4860 wrote to memory of 4648 4860 9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe 82 PID 4860 wrote to memory of 4648 4860 9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe 82 PID 4860 wrote to memory of 4648 4860 9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe 82 PID 4648 wrote to memory of 2316 4648 svchoct.exe 83 PID 4648 wrote to memory of 2316 4648 svchoct.exe 83 PID 4648 wrote to memory of 2316 4648 svchoct.exe 83 PID 4648 wrote to memory of 2316 4648 svchoct.exe 83 PID 4648 wrote to memory of 2316 4648 svchoct.exe 83 PID 2316 wrote to memory of 2192 2316 svchoct.exe 85 PID 2316 wrote to memory of 2192 2316 svchoct.exe 85 PID 2316 wrote to memory of 2192 2316 svchoct.exe 85 PID 2192 wrote to memory of 3864 2192 svchoct.exe 86 PID 2192 wrote to memory of 3864 2192 svchoct.exe 86 PID 2192 wrote to memory of 3864 2192 svchoct.exe 86 PID 2192 wrote to memory of 3864 2192 svchoct.exe 86 PID 2192 wrote to memory of 3864 2192 svchoct.exe 86 PID 3864 wrote to memory of 3040 3864 svchoct.exe 87 PID 3864 wrote to memory of 3040 3864 svchoct.exe 87 PID 3864 wrote to memory of 3040 3864 svchoct.exe 87 PID 3040 wrote to memory of 1524 3040 svchoct.exe 88 PID 3040 wrote to memory of 1524 3040 svchoct.exe 88 PID 3040 wrote to memory of 1524 3040 svchoct.exe 88 PID 3040 wrote to memory of 1524 3040 svchoct.exe 88 PID 3040 wrote to memory of 1524 3040 svchoct.exe 88 PID 1524 wrote to memory of 2212 1524 svchoct.exe 90 PID 1524 wrote to memory of 2212 1524 svchoct.exe 90 PID 1524 wrote to memory of 2212 1524 svchoct.exe 90 PID 2212 wrote to memory of 1712 2212 svchoct.exe 91 PID 2212 wrote to memory of 1712 2212 svchoct.exe 91 PID 2212 wrote to memory of 1712 2212 svchoct.exe 91 PID 2212 wrote to memory of 1712 2212 svchoct.exe 91 PID 2212 wrote to memory of 1712 2212 svchoct.exe 91 PID 1712 wrote to memory of 5056 1712 svchoct.exe 92 PID 1712 wrote to memory of 5056 1712 svchoct.exe 92 PID 1712 wrote to memory of 5056 1712 svchoct.exe 92 PID 5056 wrote to memory of 3480 5056 svchoct.exe 93 PID 5056 wrote to memory of 3480 5056 svchoct.exe 93 PID 5056 wrote to memory of 3480 5056 svchoct.exe 93 PID 5056 wrote to memory of 3480 5056 svchoct.exe 93 PID 5056 wrote to memory of 3480 5056 svchoct.exe 93 PID 3480 wrote to memory of 1616 3480 svchoct.exe 94 PID 3480 wrote to memory of 1616 3480 svchoct.exe 94 PID 3480 wrote to memory of 1616 3480 svchoct.exe 94 PID 1616 wrote to memory of 2264 1616 svchoct.exe 95 PID 1616 wrote to memory of 2264 1616 svchoct.exe 95 PID 1616 wrote to memory of 2264 1616 svchoct.exe 95 PID 1616 wrote to memory of 2264 1616 svchoct.exe 95 PID 1616 wrote to memory of 2264 1616 svchoct.exe 95 PID 2264 wrote to memory of 4660 2264 svchoct.exe 96 PID 2264 wrote to memory of 4660 2264 svchoct.exe 96 PID 2264 wrote to memory of 4660 2264 svchoct.exe 96 PID 4660 wrote to memory of 2704 4660 svchoct.exe 97 PID 4660 wrote to memory of 2704 4660 svchoct.exe 97 PID 4660 wrote to memory of 2704 4660 svchoct.exe 97 PID 4660 wrote to memory of 2704 4660 svchoct.exe 97 PID 4660 wrote to memory of 2704 4660 svchoct.exe 97 PID 2704 wrote to memory of 3836 2704 svchoct.exe 98 PID 2704 wrote to memory of 3836 2704 svchoct.exe 98 PID 2704 wrote to memory of 3836 2704 svchoct.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe"C:\Users\Admin\AppData\Local\Temp\9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Users\Admin\AppData\Local\Temp\9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exeC:\Users\Admin\AppData\Local\Temp\9e45723659f1e27d160ec1bea2ab4195a081303a2881245b603973d20621ce49.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3864 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5056 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3836 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe18⤵
- Executes dropped EXE
PID:1920
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4656 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe2⤵
- Executes dropped EXE
PID:4352 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1768 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe4⤵
- Executes dropped EXE
PID:2184 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2836 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe6⤵
- Executes dropped EXE
PID:1680 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2256 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe8⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4576 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe10⤵
- Executes dropped EXE
PID:5016 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:1332 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3032 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4852 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe14⤵
- Executes dropped EXE
PID:3548 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2948 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe16⤵
- Executes dropped EXE
PID:4072 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2444 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe18⤵
- Executes dropped EXE
PID:2244 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:260 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe20⤵
- Executes dropped EXE
PID:2152 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4112 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe22⤵
- Executes dropped EXE
PID:3964 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2688 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe24⤵
- Executes dropped EXE
PID:1080 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3004 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe26⤵
- Executes dropped EXE
PID:1168 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4780 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe28⤵
- Executes dropped EXE
PID:3212 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4220 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe30⤵
- Executes dropped EXE
PID:224 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:212 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3892 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1236 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe34⤵
- Executes dropped EXE
PID:4796 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3912 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe36⤵
- Executes dropped EXE
PID:1212 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3276 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe38⤵
- Executes dropped EXE
PID:3752 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4988 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe40⤵
- Executes dropped EXE
PID:776 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4032 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe42⤵
- Executes dropped EXE
PID:3956 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4836 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe44⤵
- Executes dropped EXE
PID:4224 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2656 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe46⤵
- Executes dropped EXE
PID:3136 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2648 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe48⤵PID:1888
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"49⤵
- Suspicious use of SetThreadContext
PID:4536 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe50⤵
- Drops file in System32 directory
PID:4692 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"51⤵
- Suspicious use of SetThreadContext
PID:4596 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe52⤵PID:3540
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"53⤵
- Suspicious use of SetThreadContext
PID:3900 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe54⤵PID:3080
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"55⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:516 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe56⤵
- Drops file in System32 directory
PID:2268 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"57⤵
- Suspicious use of SetThreadContext
PID:2772 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe58⤵PID:1248
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"59⤵
- Suspicious use of SetThreadContext
PID:1508 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe60⤵PID:2208
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"61⤵
- Suspicious use of SetThreadContext
PID:2400 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe62⤵PID:2192
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"63⤵
- Suspicious use of SetThreadContext
PID:2220 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe64⤵PID:4996
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"65⤵
- Suspicious use of SetThreadContext
PID:3840 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe66⤵PID:2496
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"67⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:1768 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe68⤵PID:3500
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"69⤵
- Suspicious use of SetThreadContext
PID:1540 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe70⤵PID:3920
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"71⤵
- Suspicious use of SetThreadContext
PID:1076 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe72⤵PID:1636
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"73⤵
- Suspicious use of SetThreadContext
PID:1140 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe74⤵PID:4580
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"75⤵
- Suspicious use of SetThreadContext
PID:3336 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe76⤵PID:2000
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"77⤵
- Suspicious use of SetThreadContext
PID:3608 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe78⤵PID:5080
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"79⤵
- Suspicious use of SetThreadContext
PID:2412 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe80⤵PID:448
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"81⤵
- Suspicious use of SetThreadContext
PID:1220 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe82⤵PID:2948
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"83⤵
- Suspicious use of SetThreadContext
PID:3696 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe84⤵PID:4432
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"85⤵
- Suspicious use of SetThreadContext
PID:4448 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe86⤵PID:3424
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"87⤵
- Suspicious use of SetThreadContext
PID:1376 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe88⤵PID:4752
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"89⤵
- Suspicious use of SetThreadContext
PID:4112 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe90⤵PID:4760
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"91⤵
- Suspicious use of SetThreadContext
PID:432 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe92⤵PID:2332
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"93⤵
- Suspicious use of SetThreadContext
PID:4756 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe94⤵PID:4144
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"95⤵
- Suspicious use of SetThreadContext
PID:3048 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe96⤵PID:2304
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"97⤵
- Suspicious use of SetThreadContext
PID:3428 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe98⤵PID:2404
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"99⤵
- Suspicious use of SetThreadContext
PID:320 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe100⤵PID:3720
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"101⤵
- Suspicious use of SetThreadContext
PID:4560 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe102⤵PID:212
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"103⤵
- Drops file in System32 directory
- Suspicious use of SetThreadContext
PID:3824 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe104⤵
- Drops file in System32 directory
PID:3856 -
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"105⤵
- Suspicious use of SetThreadContext
PID:1484 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe106⤵PID:3272
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"107⤵
- Suspicious use of SetThreadContext
PID:2548 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe108⤵PID:1088
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"109⤵
- Suspicious use of SetThreadContext
PID:3276 -
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe110⤵PID:4916
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"111⤵PID:3324
-
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe112⤵PID:396
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"113⤵PID:1660
-
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe114⤵PID:4668
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"115⤵PID:5108
-
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe116⤵PID:3936
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"117⤵PID:2204
-
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe118⤵PID:3196
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"119⤵PID:4556
-
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe120⤵PID:3704
-
C:\Windows\SysWOW64\svchoct.exe"C:\Windows\system32\svchoct.exe"121⤵PID:2648
-
C:\Windows\SysWOW64\svchoct.exeC:\Windows\SysWOW64\svchoct.exe122⤵PID:3392
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-