Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
10Static
static
1017ffd90d20...e1.dll
windows7-x64
11caf510598...e1.exe
windows7-x64
101d88c47417...67.exe
windows7-x64
11ecb597741...af.exe
windows7-x64
2a5fe7d49f...b5.exe
windows7-x64
12c1aa4fa14...dc.exe
windows7-x64
834d62f47e1...6e.exe
windows7-x64
338f1b8c868...05.exe
windows7-x64
1040d8e3dae5...04.exe
windows7-x64
10410ee08c8a...59.exe
windows7-x64
6423b7b37b1...42.exe
windows7-x64
14315b6e87c...0b.exe
windows7-x64
7453c6fe9e1...91.exe
windows7-x64
14a841216cb...37.exe
windows7-x64
14e180437ef...a9.exe
windows7-x64
14fb989bc0f...00.exe
windows7-x64
1055bdc39b0b...70.exe
windows7-x64
105a1b6ba55f...c3.exe
windows7-x64
15f056a4a7a...4c.exe
windows7-x64
76709db0a92...53.exe
windows7-x64
969add888bc...df.exe
windows7-x64
76af766a07c...20.exe
windows7-x64
10719a339594...44.exe
windows7-x64
771a20e2700...db.exe
windows7-x64
17acc03a357...fd.exe
windows7-x64
77bd3e8a108...5f.exe
windows7-x64
18034ef305b...74.exe
windows7-x64
188be20529e...cb.exe
windows7-x64
8e6c6b616e...19.exe
windows7-x64
7907c21dd04...b0.exe
windows7-x64
79b1d7a498b...21.exe
windows7-x64
79b7e5d2fdc...8b.exe
windows7-x64
7Analysis
-
max time kernel
60s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
07/09/2023, 14:12
Behavioral task
behavioral1
Sample
17ffd90d20cbd49c4e0d65a484eeae65a107d5bad9582afc51c4ead8bbc147e1.dll
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1caf5105988781e29d93e58abcbf3bf4c973eca1a207803629bd5cf901ef5be1.exe
Resource
win7-20230831-en
Behavioral task
behavioral3
Sample
1d88c47417c082378c735c9e8180ea63627d5efff35852f1bb06fe6705581267.exe
Resource
win7-20230831-en
Behavioral task
behavioral4
Sample
1ecb59774182d0d0a04b418249428b621159838bd2bcdc1a3a7b871a65dd90af.exe
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
2a5fe7d49fcf65525cfbefaca92a12a0d2917d15f348a48fc7a4de7ae50776b5.exe
Resource
win7-20230831-en
Behavioral task
behavioral6
Sample
2c1aa4fa14d7055f2239dbb29ab15089cb2752e9f94ec7a360d275dd607314dc.exe
Resource
win7-20230831-en
Behavioral task
behavioral7
Sample
34d62f47e1fe45dd6309326ef696012f2473b0157e1278eea3826a95829da36e.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
38f1b8c86870354a31878d55c6897d7eb9e83f9418aafbfe9f6ff897dd3c2f05.exe
Resource
win7-20230831-en
Behavioral task
behavioral9
Sample
40d8e3dae59e911ae1cd44a03eda87d36124450287fd4f81fc095a219d8a2e04.exe
Resource
win7-20230831-en
Behavioral task
behavioral10
Sample
410ee08c8a84fbb947d5f4635c95c6c8d244a51855afd4f6aa0e82dba1c38a59.exe
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
423b7b37b1925762c4417d81bd0f434f9760c1ed844b4b47ee7f25c8d0740242.exe
Resource
win7-20230831-en
Behavioral task
behavioral12
Sample
4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe
Resource
win7-20230831-en
Behavioral task
behavioral13
Sample
453c6fe9e176af08b176430630a4eec6f1de09f7f147248dc905dc9823af1b91.exe
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
4a841216cbbd4a587cc579434a043c17f54e3eb0e7ff615b3985411587dfa837.exe
Resource
win7-20230831-en
Behavioral task
behavioral15
Sample
4e180437ef807b6ded234ad54f506d0cff518c980a055013871529b5905a46a9.exe
Resource
win7-20230831-en
Behavioral task
behavioral16
Sample
4fb989bc0ffe2ad50811ff1784f8bf4e1c1aaaee0001e0c8aeb2f8f83b065a00.exe
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
55bdc39b0b7686a57916d2fee2c0f9559e5b947d115bfcb6b5b255706a412670.exe
Resource
win7-20230831-en
Behavioral task
behavioral18
Sample
5a1b6ba55fde56e57509d2efea734d91e38a64cadaf9cda4aa31a85a592763c3.exe
Resource
win7-20230831-en
Behavioral task
behavioral19
Sample
5f056a4a7aff1927cad99e70eae7fa7ed149b5b7f51c6ddd3cdc61993836be4c.exe
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
6709db0a92e59e6662708358c0197d6b72b86ff9edb798aca32e34cad1623e53.exe
Resource
win7-20230831-en
Behavioral task
behavioral21
Sample
69add888bcdeed2c14f525f23fa52a141f1afbd420b0fdd38202e5031b3635df.exe
Resource
win7-20230831-en
Behavioral task
behavioral22
Sample
6af766a07ccc641da303ab30936ed32ad32bb4d7c983f3df45c4c52c036e9d20.exe
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
719a339594bae94aad390edd6afd0f784af416eb53b6bc64de024a55567d4244.exe
Resource
win7-20230831-en
Behavioral task
behavioral24
Sample
71a20e270052665d18bc0fe4d1f9608e51f4fd427442e7abc3e5d43c4e987bdb.exe
Resource
win7-20230831-en
Behavioral task
behavioral25
Sample
7acc03a3573061f3856c27ce5b90dc7f5cc684840862a619edd78ad849b742fd.exe
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
7bd3e8a10838e95fcb3ab06457404f03e09bd8d3881c2521be3b71fad533445f.exe
Resource
win7-20230831-en
Behavioral task
behavioral27
Sample
8034ef305be188bce8cdd98336f7cd2795c5dc74b19fdebf7cf5161f9000fb74.exe
Resource
win7-20230831-en
Behavioral task
behavioral28
Sample
88be20529ed15c95b7c9dc1ae66949fb09ebc934188de565a43e6fecf6bf63cb.exe
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
8e6c6b616e846b280572edd2beb96b4c22426963b565553609b4e2fc4b19b019.exe
Resource
win7-20230831-en
Behavioral task
behavioral30
Sample
907c21dd04dae2f48b048778f36b402c06096220b8c4462d54bd1246f0aec8b0.exe
Resource
win7-20230831-en
Behavioral task
behavioral31
Sample
9b1d7a498b1050d27f515245add3690ee79d41f64fa9a95242525c964fdd9221.exe
Resource
win7-20230831-en
Behavioral task
behavioral32
Sample
9b7e5d2fdc7192256d81ce9e4d339dcdbfd453ad1059d3efd4a7d829f5d2608b.exe
Resource
win7-20230831-en
General
-
Target
4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe
-
Size
3.9MB
-
MD5
05e136c5e18d962fc7cc490a48bf43c5
-
SHA1
db3a52fb85741df954508410d864a3b8d8a7bb36
-
SHA256
4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b
-
SHA512
e5770d49869f22761d6984298dfb34292719e743a018d48ebcef1c0430067eab83436b846a98b7e7439ead01d80ad0078d132e1333f404b0d0a14edc92f7c487
-
SSDEEP
98304:wuv7TVLSNplylkdcHc6H5aE1LQx84rK5aKYea:XLSNpl2hya0x84rKcKYea
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1988 dll.exe 2620 PhotoInstrument.exe 2788 dll.exe 2664 dll.exe 2564 dll.exe 1864 dll.exe 2896 dll.exe 2920 dll.exe 1660 dll.exe 2592 dll.exe 536 dll.exe 2808 dll.exe 1452 dll.exe 1324 dll.exe 1076 dll.exe 1716 dll.exe 2360 dll.exe 2992 dll.exe 2120 dll.exe 2280 dll.exe 108 dll.exe 2284 dll.exe 1800 dll.exe 1712 dll.exe 2964 dll.exe 1904 dll.exe 1600 dll.exe 2444 dll.exe 3068 dll.exe 2216 dll.exe 2636 dll.exe 1796 dll.exe 1588 dll.exe 2656 dll.exe 1140 dll.exe 2468 dll.exe 2492 dll.exe 2548 dll.exe 2792 dll.exe 2668 dll.exe 1884 dll.exe 2860 dll.exe 1540 dll.exe 2780 dll.exe 1348 dll.exe 268 dll.exe 1980 dll.exe 2052 dll.exe 1364 dll.exe 1216 dll.exe 656 dll.exe 1928 PhotoInstrument.exe 1648 dll.exe 676 dll.exe 108 dll.exe 1844 dll.exe 388 dll.exe 544 dll.exe 1904 dll.exe 2444 dll.exe 2192 dll.exe 2216 dll.exe 2632 dll.exe 2924 dll.exe -
Loads dropped DLL 6 IoCs
pid Process 2196 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 2196 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 2196 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 2196 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 2620 PhotoInstrument.exe 2620 PhotoInstrument.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\__tmp_rar_sfx_access_check_259415653 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe File created \??\c:\windows\SysWOW64\dll.exe 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe File opened for modification \??\c:\windows\SysWOW64\dll.exe 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe File created \??\c:\windows\SysWOW64\PhotoInstrument.exe 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe File opened for modification \??\c:\windows\SysWOW64\PhotoInstrument.exe 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2620 set thread context of 1928 2620 PhotoInstrument.exe 81 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2620 PhotoInstrument.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1988 dll.exe Token: 33 1988 dll.exe Token: SeIncBasePriorityPrivilege 1988 dll.exe Token: SeDebugPrivilege 2788 dll.exe Token: 33 2788 dll.exe Token: SeIncBasePriorityPrivilege 2788 dll.exe Token: SeDebugPrivilege 2664 dll.exe Token: 33 2664 dll.exe Token: SeIncBasePriorityPrivilege 2664 dll.exe Token: SeDebugPrivilege 2564 dll.exe Token: 33 2564 dll.exe Token: SeIncBasePriorityPrivilege 2564 dll.exe Token: SeDebugPrivilege 1864 dll.exe Token: 33 1864 dll.exe Token: SeIncBasePriorityPrivilege 1864 dll.exe Token: SeDebugPrivilege 2896 dll.exe Token: 33 2896 dll.exe Token: SeIncBasePriorityPrivilege 2896 dll.exe Token: SeDebugPrivilege 2920 dll.exe Token: 33 2920 dll.exe Token: SeIncBasePriorityPrivilege 2920 dll.exe Token: SeDebugPrivilege 1660 dll.exe Token: 33 1660 dll.exe Token: SeIncBasePriorityPrivilege 1660 dll.exe Token: SeDebugPrivilege 2592 dll.exe Token: 33 2592 dll.exe Token: SeIncBasePriorityPrivilege 2592 dll.exe Token: SeDebugPrivilege 536 dll.exe Token: 33 536 dll.exe Token: SeIncBasePriorityPrivilege 536 dll.exe Token: SeDebugPrivilege 2808 dll.exe Token: 33 2808 dll.exe Token: SeIncBasePriorityPrivilege 2808 dll.exe Token: SeDebugPrivilege 1452 dll.exe Token: 33 1452 dll.exe Token: SeIncBasePriorityPrivilege 1452 dll.exe Token: SeDebugPrivilege 1324 dll.exe Token: 33 1324 dll.exe Token: SeIncBasePriorityPrivilege 1324 dll.exe Token: SeDebugPrivilege 1076 dll.exe Token: 33 1076 dll.exe Token: SeIncBasePriorityPrivilege 1076 dll.exe Token: SeDebugPrivilege 1716 dll.exe Token: 33 1716 dll.exe Token: SeIncBasePriorityPrivilege 1716 dll.exe Token: SeDebugPrivilege 2360 dll.exe Token: 33 2360 dll.exe Token: SeIncBasePriorityPrivilege 2360 dll.exe Token: SeDebugPrivilege 2992 dll.exe Token: 33 2992 dll.exe Token: SeIncBasePriorityPrivilege 2992 dll.exe Token: SeDebugPrivilege 2120 dll.exe Token: 33 2120 dll.exe Token: SeIncBasePriorityPrivilege 2120 dll.exe Token: SeDebugPrivilege 2280 dll.exe Token: 33 2280 dll.exe Token: SeIncBasePriorityPrivilege 2280 dll.exe Token: SeDebugPrivilege 108 dll.exe Token: 33 108 dll.exe Token: SeIncBasePriorityPrivilege 108 dll.exe Token: SeDebugPrivilege 2284 dll.exe Token: 33 2284 dll.exe Token: SeIncBasePriorityPrivilege 2284 dll.exe Token: SeDebugPrivilege 1800 dll.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2196 wrote to memory of 1988 2196 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 28 PID 2196 wrote to memory of 1988 2196 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 28 PID 2196 wrote to memory of 1988 2196 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 28 PID 2196 wrote to memory of 1988 2196 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 28 PID 2196 wrote to memory of 2620 2196 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 29 PID 2196 wrote to memory of 2620 2196 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 29 PID 2196 wrote to memory of 2620 2196 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 29 PID 2196 wrote to memory of 2620 2196 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 29 PID 2196 wrote to memory of 2620 2196 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 29 PID 2196 wrote to memory of 2620 2196 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 29 PID 2196 wrote to memory of 2620 2196 4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe 29 PID 1988 wrote to memory of 2788 1988 dll.exe 30 PID 1988 wrote to memory of 2788 1988 dll.exe 30 PID 1988 wrote to memory of 2788 1988 dll.exe 30 PID 2788 wrote to memory of 2664 2788 dll.exe 31 PID 2788 wrote to memory of 2664 2788 dll.exe 31 PID 2788 wrote to memory of 2664 2788 dll.exe 31 PID 2664 wrote to memory of 2564 2664 dll.exe 32 PID 2664 wrote to memory of 2564 2664 dll.exe 32 PID 2664 wrote to memory of 2564 2664 dll.exe 32 PID 2564 wrote to memory of 1864 2564 dll.exe 33 PID 2564 wrote to memory of 1864 2564 dll.exe 33 PID 2564 wrote to memory of 1864 2564 dll.exe 33 PID 1864 wrote to memory of 2896 1864 dll.exe 34 PID 1864 wrote to memory of 2896 1864 dll.exe 34 PID 1864 wrote to memory of 2896 1864 dll.exe 34 PID 2896 wrote to memory of 2920 2896 dll.exe 35 PID 2896 wrote to memory of 2920 2896 dll.exe 35 PID 2896 wrote to memory of 2920 2896 dll.exe 35 PID 2920 wrote to memory of 1660 2920 dll.exe 36 PID 2920 wrote to memory of 1660 2920 dll.exe 36 PID 2920 wrote to memory of 1660 2920 dll.exe 36 PID 1660 wrote to memory of 2592 1660 dll.exe 37 PID 1660 wrote to memory of 2592 1660 dll.exe 37 PID 1660 wrote to memory of 2592 1660 dll.exe 37 PID 2592 wrote to memory of 536 2592 dll.exe 38 PID 2592 wrote to memory of 536 2592 dll.exe 38 PID 2592 wrote to memory of 536 2592 dll.exe 38 PID 536 wrote to memory of 2808 536 dll.exe 39 PID 536 wrote to memory of 2808 536 dll.exe 39 PID 536 wrote to memory of 2808 536 dll.exe 39 PID 2808 wrote to memory of 1452 2808 dll.exe 40 PID 2808 wrote to memory of 1452 2808 dll.exe 40 PID 2808 wrote to memory of 1452 2808 dll.exe 40 PID 1452 wrote to memory of 1324 1452 dll.exe 41 PID 1452 wrote to memory of 1324 1452 dll.exe 41 PID 1452 wrote to memory of 1324 1452 dll.exe 41 PID 1324 wrote to memory of 1076 1324 dll.exe 42 PID 1324 wrote to memory of 1076 1324 dll.exe 42 PID 1324 wrote to memory of 1076 1324 dll.exe 42 PID 1076 wrote to memory of 1716 1076 dll.exe 43 PID 1076 wrote to memory of 1716 1076 dll.exe 43 PID 1076 wrote to memory of 1716 1076 dll.exe 43 PID 1716 wrote to memory of 2360 1716 dll.exe 44 PID 1716 wrote to memory of 2360 1716 dll.exe 44 PID 1716 wrote to memory of 2360 1716 dll.exe 44 PID 2360 wrote to memory of 2992 2360 dll.exe 45 PID 2360 wrote to memory of 2992 2360 dll.exe 45 PID 2360 wrote to memory of 2992 2360 dll.exe 45 PID 2992 wrote to memory of 2120 2992 dll.exe 46 PID 2992 wrote to memory of 2120 2992 dll.exe 46 PID 2992 wrote to memory of 2120 2992 dll.exe 46 PID 2120 wrote to memory of 2280 2120 dll.exe 183 PID 2120 wrote to memory of 2280 2120 dll.exe 183
Processes
-
C:\Users\Admin\AppData\Local\Temp\4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe"C:\Users\Admin\AppData\Local\Temp\4315b6e87c88972648fac6610116046b7af4aca6bd445839ecc8f21515591a0b.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\windows\SysWOW64\dll.exe"C:\windows\system32\dll.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:536 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe12⤵
- Executes dropped EXE
PID:2808 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1324 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe18⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe20⤵PID:2280
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe21⤵PID:108
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe22⤵PID:2284
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1800 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe24⤵
- Executes dropped EXE
PID:1712 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe25⤵PID:2964
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe26⤵PID:1904
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe27⤵
- Executes dropped EXE
PID:1600 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe28⤵PID:2444
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe29⤵
- Executes dropped EXE
PID:3068 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe30⤵PID:2216
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe31⤵PID:2636
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe32⤵
- Executes dropped EXE
PID:1796 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe33⤵PID:1588
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe34⤵
- Executes dropped EXE
PID:2656 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe35⤵
- Executes dropped EXE
PID:1140 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe36⤵PID:2468
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe37⤵PID:2492
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe38⤵PID:2548
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe39⤵PID:2792
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe40⤵PID:2668
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe41⤵
- Executes dropped EXE
PID:1884 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe42⤵
- Executes dropped EXE
PID:2860 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe43⤵PID:1540
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe44⤵PID:2780
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe45⤵
- Executes dropped EXE
PID:1348 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe46⤵
- Executes dropped EXE
PID:268 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe47⤵PID:1980
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe48⤵PID:2052
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe49⤵PID:1364
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe50⤵PID:1216
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe51⤵
- Executes dropped EXE
PID:656 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe52⤵
- Executes dropped EXE
PID:1648 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe53⤵PID:676
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:108 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe55⤵
- Executes dropped EXE
PID:1844 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe56⤵
- Executes dropped EXE
PID:388 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe57⤵PID:544
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe58⤵PID:1904
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe59⤵
- Executes dropped EXE
PID:2444 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe60⤵
- Executes dropped EXE
PID:2192 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe61⤵
- Executes dropped EXE
PID:2216 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe62⤵
- Executes dropped EXE
PID:2632 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe63⤵
- Executes dropped EXE
PID:2924 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe64⤵PID:1868
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe65⤵
- Executes dropped EXE
PID:1588 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe66⤵PID:3056
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe67⤵PID:1632
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe68⤵PID:2728
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe69⤵PID:1880
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe70⤵PID:2236
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe71⤵PID:2768
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe72⤵PID:3028
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe73⤵PID:2776
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe74⤵PID:2540
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe75⤵PID:1460
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe76⤵PID:2256
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe77⤵PID:1668
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe78⤵PID:808
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe79⤵
- Executes dropped EXE
PID:1980 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe80⤵PID:1976
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe81⤵PID:780
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe82⤵PID:1596
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe83⤵PID:2840
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe84⤵PID:3000
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe85⤵PID:1688
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe86⤵PID:1848
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe87⤵PID:1516
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe88⤵PID:2160
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe89⤵PID:1056
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe90⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2284 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe91⤵PID:1680
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe92⤵
- Executes dropped EXE
PID:2964 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe93⤵PID:2516
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe94⤵PID:2228
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe95⤵PID:2968
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe96⤵PID:320
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe97⤵PID:2036
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe98⤵PID:2636
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe99⤵PID:1528
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe100⤵PID:2668
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe101⤵PID:1504
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe102⤵PID:3048
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe103⤵PID:1448
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe104⤵PID:856
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe105⤵PID:464
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe106⤵PID:2768
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe107⤵PID:2944
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe108⤵PID:2544
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe109⤵PID:1888
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe110⤵PID:2288
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe111⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe112⤵PID:1768
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe113⤵PID:1192
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe114⤵PID:2012
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe115⤵PID:1592
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe116⤵PID:1704
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe117⤵PID:1656
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe118⤵PID:2684
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe119⤵PID:1952
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe120⤵PID:1984
-
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe121⤵
- Executes dropped EXE
PID:1904 -
C:\windows\SysWOW64\dll.exeC:\windows\SysWOW64\dll.exe122⤵PID:2784
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-