Analysis
-
max time kernel
50s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
25/01/2024, 22:36
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
75aee62ffbb7b0c0b98d0644775cc4d9.exe
Resource
win7-20231215-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
75aee62ffbb7b0c0b98d0644775cc4d9.exe
Resource
win10v2004-20231222-en
5 signatures
150 seconds
General
-
Target
75aee62ffbb7b0c0b98d0644775cc4d9.exe
-
Size
109KB
-
MD5
75aee62ffbb7b0c0b98d0644775cc4d9
-
SHA1
ddd6655529373149cccea439c28e5a0adc032fbb
-
SHA256
77a6c04f23d902ea59fa739f84b626212e8ae294b5ee5339503181ccf82ebfcb
-
SHA512
3be09632553ca1a5b3d1fca00b9512be033ab98877d28beee935f4dc8f7b7e8e1c541fd8ffcfc7717832eee8b9221d0f7e41117a03530e6ca00b973154ec684c
-
SSDEEP
1536:rVqwVs/YkztkBedUltbhZmFqAF1sa6KczkDVP2DfsTE/4yMsBfXh5X8r2JQ:lVsLkPThZ01N6KVO4TK4/sBfR5X8r2JQ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2564 EXPL0RER.EXE 1352 EXPL0RER.EXE 1620 EXPL0RER.EXE 2024 EXPL0RER.EXE 2928 EXPL0RER.EXE 1432 EXPL0RER.EXE 1292 EXPL0RER.EXE 3756 EXPL0RER.EXE 4848 EXPL0RER.EXE 3000 EXPL0RER.EXE 4888 EXPL0RER.EXE 3356 EXPL0RER.EXE 2464 EXPL0RER.EXE 2236 EXPL0RER.EXE 4428 EXPL0RER.EXE 676 EXPL0RER.EXE 4716 EXPL0RER.EXE 3724 EXPL0RER.EXE 3576 EXPL0RER.EXE 2520 EXPL0RER.EXE 4480 EXPL0RER.EXE 3672 EXPL0RER.EXE 4432 EXPL0RER.EXE 4156 EXPL0RER.EXE 2036 EXPL0RER.EXE 4324 EXPL0RER.EXE 4800 EXPL0RER.EXE 5032 EXPL0RER.EXE 512 EXPL0RER.EXE 3748 EXPL0RER.EXE 3560 EXPL0RER.EXE 4336 EXPL0RER.EXE 4796 EXPL0RER.EXE 1772 EXPL0RER.EXE 4884 EXPL0RER.EXE 3064 EXPL0RER.EXE 2436 EXPL0RER.EXE 460 EXPL0RER.EXE 2420 EXPL0RER.EXE 5028 EXPL0RER.EXE 4868 EXPL0RER.EXE 856 EXPL0RER.EXE 3520 EXPL0RER.EXE 852 EXPL0RER.EXE 532 EXPL0RER.EXE 3732 EXPL0RER.EXE 848 EXPL0RER.EXE 2348 EXPL0RER.EXE 3376 EXPL0RER.EXE 1108 EXPL0RER.EXE 4600 EXPL0RER.EXE 4672 EXPL0RER.EXE 1796 EXPL0RER.EXE 3508 EXPL0RER.EXE 3568 EXPL0RER.EXE 3440 EXPL0RER.EXE 2124 EXPL0RER.EXE 3656 EXPL0RER.EXE 384 EXPL0RER.EXE 3164 EXPL0RER.EXE 3176 EXPL0RER.EXE 228 EXPL0RER.EXE 3232 EXPL0RER.EXE 2444 EXPL0RER.EXE -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL Process not Found File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL Process not Found File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc Process not Found File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL Process not Found File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL Process not Found File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE Process not Found File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL Process not Found File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc Process not Found File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc Process not Found File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXE 75aee62ffbb7b0c0b98d0644775cc4d9.exe File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL Process not Found File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc Process not Found File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc Process not Found File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL Process not Found File opened for modification C:\Windows\SysWOW64\SysModule32.DLL Process not Found File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL cmd.exe File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL Process not Found File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL Process not Found File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL Process not Found File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL Process not Found File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL Process not Found File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL cmd.exe File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL Process not Found File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL cmd.exe File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL Process not Found File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL Process not Found File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL Process not Found File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL Process not Found File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE -
Program crash 8 IoCs
pid pid_target Process procid_target 11712 5984 WerFault.exe 208 11728 5920 WerFault.exe 207 13308 7092 WerFault.exe 252 13240 6960 WerFault.exe 250 13232 6716 WerFault.exe 246 1384 6844 WerFault.exe 248 13252 16832 Process not Found 1364 7852 14936 Process not Found 1132 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4892 wrote to memory of 2564 4892 75aee62ffbb7b0c0b98d0644775cc4d9.exe 87 PID 4892 wrote to memory of 2564 4892 75aee62ffbb7b0c0b98d0644775cc4d9.exe 87 PID 4892 wrote to memory of 2564 4892 75aee62ffbb7b0c0b98d0644775cc4d9.exe 87 PID 2564 wrote to memory of 1352 2564 EXPL0RER.EXE 89 PID 2564 wrote to memory of 1352 2564 EXPL0RER.EXE 89 PID 2564 wrote to memory of 1352 2564 EXPL0RER.EXE 89 PID 1352 wrote to memory of 1620 1352 EXPL0RER.EXE 91 PID 1352 wrote to memory of 1620 1352 EXPL0RER.EXE 91 PID 1352 wrote to memory of 1620 1352 EXPL0RER.EXE 91 PID 1620 wrote to memory of 2024 1620 EXPL0RER.EXE 92 PID 1620 wrote to memory of 2024 1620 EXPL0RER.EXE 92 PID 1620 wrote to memory of 2024 1620 EXPL0RER.EXE 92 PID 2024 wrote to memory of 2928 2024 EXPL0RER.EXE 93 PID 2024 wrote to memory of 2928 2024 EXPL0RER.EXE 93 PID 2024 wrote to memory of 2928 2024 EXPL0RER.EXE 93 PID 2928 wrote to memory of 1432 2928 EXPL0RER.EXE 94 PID 2928 wrote to memory of 1432 2928 EXPL0RER.EXE 94 PID 2928 wrote to memory of 1432 2928 EXPL0RER.EXE 94 PID 1432 wrote to memory of 1292 1432 EXPL0RER.EXE 95 PID 1432 wrote to memory of 1292 1432 EXPL0RER.EXE 95 PID 1432 wrote to memory of 1292 1432 EXPL0RER.EXE 95 PID 1292 wrote to memory of 3756 1292 EXPL0RER.EXE 96 PID 1292 wrote to memory of 3756 1292 EXPL0RER.EXE 96 PID 1292 wrote to memory of 3756 1292 EXPL0RER.EXE 96 PID 3756 wrote to memory of 4848 3756 EXPL0RER.EXE 97 PID 3756 wrote to memory of 4848 3756 EXPL0RER.EXE 97 PID 3756 wrote to memory of 4848 3756 EXPL0RER.EXE 97 PID 4848 wrote to memory of 3000 4848 EXPL0RER.EXE 98 PID 4848 wrote to memory of 3000 4848 EXPL0RER.EXE 98 PID 4848 wrote to memory of 3000 4848 EXPL0RER.EXE 98 PID 3000 wrote to memory of 4888 3000 EXPL0RER.EXE 99 PID 3000 wrote to memory of 4888 3000 EXPL0RER.EXE 99 PID 3000 wrote to memory of 4888 3000 EXPL0RER.EXE 99 PID 4888 wrote to memory of 3356 4888 EXPL0RER.EXE 100 PID 4888 wrote to memory of 3356 4888 EXPL0RER.EXE 100 PID 4888 wrote to memory of 3356 4888 EXPL0RER.EXE 100 PID 3356 wrote to memory of 2464 3356 EXPL0RER.EXE 101 PID 3356 wrote to memory of 2464 3356 EXPL0RER.EXE 101 PID 3356 wrote to memory of 2464 3356 EXPL0RER.EXE 101 PID 2464 wrote to memory of 2236 2464 EXPL0RER.EXE 102 PID 2464 wrote to memory of 2236 2464 EXPL0RER.EXE 102 PID 2464 wrote to memory of 2236 2464 EXPL0RER.EXE 102 PID 2236 wrote to memory of 4428 2236 EXPL0RER.EXE 103 PID 2236 wrote to memory of 4428 2236 EXPL0RER.EXE 103 PID 2236 wrote to memory of 4428 2236 EXPL0RER.EXE 103 PID 4428 wrote to memory of 676 4428 EXPL0RER.EXE 104 PID 4428 wrote to memory of 676 4428 EXPL0RER.EXE 104 PID 4428 wrote to memory of 676 4428 EXPL0RER.EXE 104 PID 676 wrote to memory of 4716 676 EXPL0RER.EXE 105 PID 676 wrote to memory of 4716 676 EXPL0RER.EXE 105 PID 676 wrote to memory of 4716 676 EXPL0RER.EXE 105 PID 4716 wrote to memory of 3724 4716 EXPL0RER.EXE 106 PID 4716 wrote to memory of 3724 4716 EXPL0RER.EXE 106 PID 4716 wrote to memory of 3724 4716 EXPL0RER.EXE 106 PID 3724 wrote to memory of 3576 3724 EXPL0RER.EXE 107 PID 3724 wrote to memory of 3576 3724 EXPL0RER.EXE 107 PID 3724 wrote to memory of 3576 3724 EXPL0RER.EXE 107 PID 3576 wrote to memory of 2520 3576 EXPL0RER.EXE 108 PID 3576 wrote to memory of 2520 3576 EXPL0RER.EXE 108 PID 3576 wrote to memory of 2520 3576 EXPL0RER.EXE 108 PID 2520 wrote to memory of 4480 2520 EXPL0RER.EXE 109 PID 2520 wrote to memory of 4480 2520 EXPL0RER.EXE 109 PID 2520 wrote to memory of 4480 2520 EXPL0RER.EXE 109 PID 4480 wrote to memory of 3672 4480 EXPL0RER.EXE 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\75aee62ffbb7b0c0b98d0644775cc4d9.exe"C:\Users\Admin\AppData\Local\Temp\75aee62ffbb7b0c0b98d0644775cc4d9.exe"1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4848 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE13⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE23⤵
- Executes dropped EXE
PID:3672 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4432 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE25⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4156 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE26⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2036 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE27⤵
- Executes dropped EXE
PID:4324 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE28⤵
- Executes dropped EXE
PID:4800 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE29⤵
- Executes dropped EXE
PID:5032 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE30⤵
- Executes dropped EXE
PID:512 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE31⤵
- Executes dropped EXE
PID:3748 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE32⤵
- Executes dropped EXE
PID:3560 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE33⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4336 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4796 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE35⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE36⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4884 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE37⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE38⤵
- Executes dropped EXE
PID:2436 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE39⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:460 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE40⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2420 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE41⤵
- Executes dropped EXE
PID:5028 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE42⤵
- Executes dropped EXE
PID:4868 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE43⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:856 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE44⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3520 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE45⤵
- Executes dropped EXE
PID:852 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE46⤵
- Executes dropped EXE
PID:532 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3732 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE48⤵
- Executes dropped EXE
PID:848 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE49⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2348 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE50⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3376 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE51⤵
- Executes dropped EXE
PID:1108 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE52⤵
- Executes dropped EXE
PID:4600 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE53⤵
- Executes dropped EXE
PID:4672 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE54⤵
- Executes dropped EXE
PID:1796 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE55⤵
- Executes dropped EXE
PID:3508 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE56⤵
- Executes dropped EXE
PID:3568 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE57⤵
- Executes dropped EXE
PID:3440 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE58⤵
- Executes dropped EXE
PID:2124 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE59⤵
- Executes dropped EXE
PID:3656 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE60⤵
- Executes dropped EXE
PID:384 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE61⤵
- Executes dropped EXE
PID:3164 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE62⤵
- Executes dropped EXE
PID:3176 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE63⤵
- Executes dropped EXE
PID:228 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE64⤵
- Executes dropped EXE
PID:3232 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE65⤵
- Executes dropped EXE
PID:2444 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE66⤵PID:952
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE67⤵PID:3764
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE68⤵PID:4180
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE69⤵PID:3124
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE70⤵PID:364
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE71⤵
- Drops file in System32 directory
PID:2008 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE72⤵
- Drops file in Windows directory
PID:4460 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE73⤵PID:828
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE74⤵PID:3056
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE75⤵PID:2976
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE76⤵PID:3492
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE77⤵PID:1384
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE78⤵PID:3264
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE79⤵PID:2704
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE80⤵
- Drops file in System32 directory
PID:4712 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE81⤵PID:1036
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE82⤵PID:4508
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE83⤵PID:2384
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE84⤵PID:1868
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE85⤵PID:916
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE86⤵PID:3168
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE87⤵
- Drops file in System32 directory
PID:2960 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE88⤵PID:4412
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE89⤵
- Drops file in System32 directory
PID:5168 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE90⤵PID:5220
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE91⤵
- Drops file in System32 directory
PID:5300 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE92⤵PID:5368
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE93⤵PID:5420
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE94⤵PID:5520
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE95⤵PID:5592
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE96⤵PID:5640
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE97⤵PID:5688
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE98⤵PID:5736
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE99⤵PID:5796
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE100⤵PID:5852
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE101⤵PID:5900
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE102⤵PID:5948
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE103⤵PID:5996
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE104⤵PID:6048
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE105⤵PID:6100
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE106⤵PID:2364
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE107⤵PID:1516
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE108⤵PID:5192
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE109⤵PID:5288
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE110⤵
- Drops file in Windows directory
PID:5392 -
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE111⤵PID:5512
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE112⤵PID:5632
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE113⤵PID:5676
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE114⤵PID:5764
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE115⤵PID:5844
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE116⤵PID:5920
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE117⤵PID:5984
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE118⤵PID:6072
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE119⤵PID:3940
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE120⤵PID:5216
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE121⤵PID:5360
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE122⤵PID:5560
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-