Analysis
-
max time kernel
211s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 14:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
009e7941ceae50c5f7220462fcf35b0c.exe
Resource
win7-20231215-en
7 signatures
150 seconds
General
-
Target
009e7941ceae50c5f7220462fcf35b0c.exe
-
Size
216KB
-
MD5
009e7941ceae50c5f7220462fcf35b0c
-
SHA1
3f32bdcf43cf1baea2eaea9627c62e7e8ff35c18
-
SHA256
bd279983321721952ecc03d4b3de85e991e1dfd8eb072e79a51d8a382b2d5111
-
SHA512
f62668a4127a46c142636d3ff88f3a28ea9a8f7048e94feae6f4429401b18ad3b0a0bb082e3f9957fea5d4bb2085a13122f9c881688d0243b5bf820571e3ee7b
-
SSDEEP
6144:HGZLlL56XKpWl+PHwFb2B6XKpWVJl1ZbG:sLfg+oFOa7q
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 980 kernel.exe 2340 kernel.exe 1508 kernel.exe 1956 kernel.exe 1068 kernel.exe 2544 kernel.exe 1960 kernel.exe 872 kernel.exe 392 kernel.exe 2052 kernel.exe 1736 kernel.exe 1544 kernel.exe 2312 kernel.exe 2152 kernel.exe 664 kernel.exe 2252 kernel.exe 2004 kernel.exe 2012 kernel.exe 2308 kernel.exe 1864 kernel.exe 1984 kernel.exe 1616 kernel.exe 2872 kernel.exe 1760 kernel.exe 996 kernel.exe 1660 kernel.exe 2940 kernel.exe 2788 kernel.exe 2848 kernel.exe 2600 kernel.exe 2596 kernel.exe 2024 kernel.exe 2708 kernel.exe 2688 kernel.exe 2584 kernel.exe 1656 kernel.exe 2512 kernel.exe 2832 kernel.exe 2616 kernel.exe 3048 kernel.exe 1540 kernel.exe 636 kernel.exe 1456 kernel.exe 3004 kernel.exe 476 kernel.exe 1552 kernel.exe 952 kernel.exe 3052 kernel.exe 2896 kernel.exe 2892 kernel.exe 2304 kernel.exe 1292 kernel.exe 2276 kernel.exe 2632 kernel.exe 2228 kernel.exe 320 kernel.exe 2352 kernel.exe 2404 kernel.exe 2332 kernel.exe 1500 kernel.exe 1376 kernel.exe 1988 kernel.exe 1976 kernel.exe 1768 kernel.exe -
Loads dropped DLL 64 IoCs
pid Process 2696 009e7941ceae50c5f7220462fcf35b0c.exe 2696 009e7941ceae50c5f7220462fcf35b0c.exe 980 kernel.exe 980 kernel.exe 2340 kernel.exe 2340 kernel.exe 1508 kernel.exe 1508 kernel.exe 1956 kernel.exe 1956 kernel.exe 1068 kernel.exe 1068 kernel.exe 2544 kernel.exe 2544 kernel.exe 1960 kernel.exe 1960 kernel.exe 872 kernel.exe 872 kernel.exe 392 kernel.exe 392 kernel.exe 2052 kernel.exe 2052 kernel.exe 1736 kernel.exe 1736 kernel.exe 1544 kernel.exe 1544 kernel.exe 2312 kernel.exe 2312 kernel.exe 2152 kernel.exe 2152 kernel.exe 664 kernel.exe 664 kernel.exe 2252 kernel.exe 2252 kernel.exe 2004 kernel.exe 2004 kernel.exe 2012 kernel.exe 2012 kernel.exe 2308 kernel.exe 2308 kernel.exe 1864 kernel.exe 1864 kernel.exe 1984 kernel.exe 1984 kernel.exe 1616 kernel.exe 1616 kernel.exe 2872 kernel.exe 2872 kernel.exe 1760 kernel.exe 1760 kernel.exe 996 kernel.exe 996 kernel.exe 1660 kernel.exe 1660 kernel.exe 2940 kernel.exe 2940 kernel.exe 2788 kernel.exe 2788 kernel.exe 2848 kernel.exe 2848 kernel.exe 2600 kernel.exe 2600 kernel.exe 2596 kernel.exe 2596 kernel.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe File created C:\Windows\SysWOW64\kernel.exe kernel.exe File opened for modification C:\Windows\SysWOW64\kernel.exe kernel.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2696 009e7941ceae50c5f7220462fcf35b0c.exe 980 kernel.exe 2340 kernel.exe 1508 kernel.exe 1956 kernel.exe 1068 kernel.exe 2544 kernel.exe 1960 kernel.exe 872 kernel.exe 392 kernel.exe 2052 kernel.exe 1736 kernel.exe 1544 kernel.exe 2312 kernel.exe 2152 kernel.exe 664 kernel.exe 2252 kernel.exe 2004 kernel.exe 2012 kernel.exe 2308 kernel.exe 1864 kernel.exe 1984 kernel.exe 1616 kernel.exe 2872 kernel.exe 1760 kernel.exe 996 kernel.exe 1660 kernel.exe 2940 kernel.exe 2788 kernel.exe 2848 kernel.exe 2600 kernel.exe 2596 kernel.exe 2024 kernel.exe 2708 kernel.exe 2688 kernel.exe 2584 kernel.exe 1656 kernel.exe 2832 kernel.exe 2616 kernel.exe 3048 kernel.exe 1540 kernel.exe 636 kernel.exe 1456 kernel.exe 3004 kernel.exe 476 kernel.exe 1552 kernel.exe 952 kernel.exe 3052 kernel.exe 2896 kernel.exe 2892 kernel.exe 2304 kernel.exe 1292 kernel.exe 2276 kernel.exe 2632 kernel.exe 2228 kernel.exe 320 kernel.exe 2352 kernel.exe 2404 kernel.exe 2332 kernel.exe 1500 kernel.exe 1376 kernel.exe 1988 kernel.exe 1976 kernel.exe 1768 kernel.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2696 wrote to memory of 980 2696 009e7941ceae50c5f7220462fcf35b0c.exe 29 PID 2696 wrote to memory of 980 2696 009e7941ceae50c5f7220462fcf35b0c.exe 29 PID 2696 wrote to memory of 980 2696 009e7941ceae50c5f7220462fcf35b0c.exe 29 PID 2696 wrote to memory of 980 2696 009e7941ceae50c5f7220462fcf35b0c.exe 29 PID 980 wrote to memory of 2340 980 kernel.exe 30 PID 980 wrote to memory of 2340 980 kernel.exe 30 PID 980 wrote to memory of 2340 980 kernel.exe 30 PID 980 wrote to memory of 2340 980 kernel.exe 30 PID 2340 wrote to memory of 1508 2340 kernel.exe 31 PID 2340 wrote to memory of 1508 2340 kernel.exe 31 PID 2340 wrote to memory of 1508 2340 kernel.exe 31 PID 2340 wrote to memory of 1508 2340 kernel.exe 31 PID 1508 wrote to memory of 1956 1508 kernel.exe 32 PID 1508 wrote to memory of 1956 1508 kernel.exe 32 PID 1508 wrote to memory of 1956 1508 kernel.exe 32 PID 1508 wrote to memory of 1956 1508 kernel.exe 32 PID 1956 wrote to memory of 1068 1956 kernel.exe 33 PID 1956 wrote to memory of 1068 1956 kernel.exe 33 PID 1956 wrote to memory of 1068 1956 kernel.exe 33 PID 1956 wrote to memory of 1068 1956 kernel.exe 33 PID 1068 wrote to memory of 2544 1068 kernel.exe 34 PID 1068 wrote to memory of 2544 1068 kernel.exe 34 PID 1068 wrote to memory of 2544 1068 kernel.exe 34 PID 1068 wrote to memory of 2544 1068 kernel.exe 34 PID 2544 wrote to memory of 1960 2544 kernel.exe 35 PID 2544 wrote to memory of 1960 2544 kernel.exe 35 PID 2544 wrote to memory of 1960 2544 kernel.exe 35 PID 2544 wrote to memory of 1960 2544 kernel.exe 35 PID 1960 wrote to memory of 872 1960 kernel.exe 36 PID 1960 wrote to memory of 872 1960 kernel.exe 36 PID 1960 wrote to memory of 872 1960 kernel.exe 36 PID 1960 wrote to memory of 872 1960 kernel.exe 36 PID 872 wrote to memory of 392 872 kernel.exe 37 PID 872 wrote to memory of 392 872 kernel.exe 37 PID 872 wrote to memory of 392 872 kernel.exe 37 PID 872 wrote to memory of 392 872 kernel.exe 37 PID 392 wrote to memory of 2052 392 kernel.exe 38 PID 392 wrote to memory of 2052 392 kernel.exe 38 PID 392 wrote to memory of 2052 392 kernel.exe 38 PID 392 wrote to memory of 2052 392 kernel.exe 38 PID 2052 wrote to memory of 1736 2052 kernel.exe 39 PID 2052 wrote to memory of 1736 2052 kernel.exe 39 PID 2052 wrote to memory of 1736 2052 kernel.exe 39 PID 2052 wrote to memory of 1736 2052 kernel.exe 39 PID 1736 wrote to memory of 1544 1736 kernel.exe 40 PID 1736 wrote to memory of 1544 1736 kernel.exe 40 PID 1736 wrote to memory of 1544 1736 kernel.exe 40 PID 1736 wrote to memory of 1544 1736 kernel.exe 40 PID 1544 wrote to memory of 2312 1544 kernel.exe 41 PID 1544 wrote to memory of 2312 1544 kernel.exe 41 PID 1544 wrote to memory of 2312 1544 kernel.exe 41 PID 1544 wrote to memory of 2312 1544 kernel.exe 41 PID 2312 wrote to memory of 2152 2312 kernel.exe 42 PID 2312 wrote to memory of 2152 2312 kernel.exe 42 PID 2312 wrote to memory of 2152 2312 kernel.exe 42 PID 2312 wrote to memory of 2152 2312 kernel.exe 42 PID 2152 wrote to memory of 664 2152 kernel.exe 43 PID 2152 wrote to memory of 664 2152 kernel.exe 43 PID 2152 wrote to memory of 664 2152 kernel.exe 43 PID 2152 wrote to memory of 664 2152 kernel.exe 43 PID 664 wrote to memory of 2252 664 kernel.exe 44 PID 664 wrote to memory of 2252 664 kernel.exe 44 PID 664 wrote to memory of 2252 664 kernel.exe 44 PID 664 wrote to memory of 2252 664 kernel.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\009e7941ceae50c5f7220462fcf35b0c.exe"C:\Users\Admin\AppData\Local\Temp\009e7941ceae50c5f7220462fcf35b0c.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1068 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:664 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2252 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2004 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2012 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2308 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1864 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1984 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1616 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2872 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1760 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:996 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1660 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2848 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2596 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe33⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2024 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe34⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe35⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe36⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe37⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe38⤵
- Executes dropped EXE
PID:2512 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2832 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe41⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3048 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe42⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:636 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe44⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1456 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe45⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3004 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:476 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe47⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1552 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe48⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:952 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe49⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3052 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe50⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2892 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe52⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2304 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1292 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2276 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe55⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe56⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2228 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe57⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:320 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe58⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2352 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe59⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2404 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe60⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2332 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe61⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1500 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe62⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1376 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe63⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe64⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1976 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe65⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1768 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe66⤵PID:1676
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe67⤵
- Drops file in System32 directory
PID:2340 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe68⤵PID:1316
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe69⤵
- Drops file in System32 directory
PID:2052 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe70⤵
- Drops file in System32 directory
PID:2376 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe71⤵PID:2420
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe72⤵PID:1304
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe73⤵PID:1068
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe74⤵
- Drops file in System32 directory
PID:2356 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe75⤵
- Drops file in System32 directory
PID:2976 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe76⤵
- Drops file in System32 directory
PID:1744 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe77⤵PID:664
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe78⤵PID:2252
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe79⤵PID:2820
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe80⤵PID:2308
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe81⤵PID:616
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe82⤵
- Drops file in System32 directory
PID:2104 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe83⤵PID:1884
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe84⤵PID:1704
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe85⤵PID:2672
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe86⤵PID:2692
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe87⤵PID:2372
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe88⤵
- Drops file in System32 directory
PID:1156 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe89⤵PID:2020
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe90⤵PID:696
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe91⤵PID:1560
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe92⤵PID:644
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe93⤵PID:292
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe94⤵PID:1680
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe95⤵PID:2656
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe96⤵PID:2760
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe97⤵PID:1624
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe98⤵PID:2840
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe99⤵PID:2936
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe100⤵
- Drops file in System32 directory
PID:1916 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe101⤵PID:2772
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe102⤵PID:1296
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe103⤵PID:944
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe104⤵PID:2992
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe105⤵PID:1540
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe106⤵PID:936
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe107⤵PID:2264
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe108⤵PID:2700
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe109⤵PID:1656
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe110⤵PID:2076
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe111⤵PID:2568
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe112⤵PID:2040
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe113⤵PID:3064
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe114⤵
- Drops file in System32 directory
PID:2912 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe115⤵
- Drops file in System32 directory
PID:1444 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe116⤵PID:1576
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe117⤵
- Drops file in System32 directory
PID:1284 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe118⤵PID:2392
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe119⤵PID:1684
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe120⤵PID:1300
-
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe121⤵
- Drops file in System32 directory
PID:2464 -
C:\Windows\SysWOW64\kernel.exeC:\Windows\system32\kernel.exe122⤵PID:1460
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-