Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
28s -
max time network
28s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
14/03/2024, 21:02
Behavioral task
behavioral1
Sample
7ea0c382afcdd8b091b5d28e306793bda8438f6a8916cb2c89426d87a1a549a8.exe
Resource
win7-20240221-en
General
-
Target
7ea0c382afcdd8b091b5d28e306793bda8438f6a8916cb2c89426d87a1a549a8.exe
-
Size
1.0MB
-
MD5
70506bd9dbe725b87e81dc5ae62f5c23
-
SHA1
2536764e693ef66e47d8068aad20fe7209303be1
-
SHA256
7ea0c382afcdd8b091b5d28e306793bda8438f6a8916cb2c89426d87a1a549a8
-
SHA512
d2baa2c564c8d4b320cb314e4598fccdb74375bc363fd105a8712efa240e6d6ff01b00b357f21489574305691990466a0f836fc0d81050bf17002e6d7f1a0f01
-
SSDEEP
24576:zv3/fTLF671TilQFG4P5PMkyWjqOW/KRDcb1XzJDaD:Lz071uv4BPMkyWvW/cD
Malware Config
Signatures
-
Detects executables containing URLs to raw contents of a Github gist 9 IoCs
resource yara_rule behavioral2/memory/1416-657-0x00007FF749950000-0x00007FF749D42000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/3388-841-0x00007FF75B310000-0x00007FF75B702000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2484-845-0x00007FF74EE30000-0x00007FF74F222000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4936-847-0x00007FF6AA140000-0x00007FF6AA532000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4692-848-0x00007FF67D960000-0x00007FF67DD52000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4616-849-0x00007FF70C1B0000-0x00007FF70C5A2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/384-851-0x00007FF664AD0000-0x00007FF664EC2000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/2408-852-0x00007FF6DFF50000-0x00007FF6E0342000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL behavioral2/memory/4120-853-0x00007FF70DB80000-0x00007FF70DF72000-memory.dmp INDICATOR_SUSPICIOUS_EXE_RawGitHub_URL -
UPX dump on OEP (original entry point) 18 IoCs
resource yara_rule behavioral2/memory/3008-0-0x00007FF74DAE0000-0x00007FF74DED2000-memory.dmp UPX behavioral2/files/0x0007000000023200-6.dat UPX behavioral2/files/0x0007000000023200-25.dat UPX behavioral2/files/0x000700000002321e-194.dat UPX behavioral2/files/0x000700000002321f-195.dat UPX behavioral2/memory/1416-657-0x00007FF749950000-0x00007FF749D42000-memory.dmp UPX behavioral2/memory/3388-841-0x00007FF75B310000-0x00007FF75B702000-memory.dmp UPX behavioral2/memory/2484-845-0x00007FF74EE30000-0x00007FF74F222000-memory.dmp UPX behavioral2/memory/4936-847-0x00007FF6AA140000-0x00007FF6AA532000-memory.dmp UPX behavioral2/memory/4692-848-0x00007FF67D960000-0x00007FF67DD52000-memory.dmp UPX behavioral2/memory/4616-849-0x00007FF70C1B0000-0x00007FF70C5A2000-memory.dmp UPX behavioral2/memory/384-851-0x00007FF664AD0000-0x00007FF664EC2000-memory.dmp UPX behavioral2/memory/2408-852-0x00007FF6DFF50000-0x00007FF6E0342000-memory.dmp UPX behavioral2/memory/4120-853-0x00007FF70DB80000-0x00007FF70DF72000-memory.dmp UPX behavioral2/memory/10748-1563-0x00007FF710310000-0x00007FF710702000-memory.dmp UPX behavioral2/memory/9948-2082-0x00007FF776160000-0x00007FF776552000-memory.dmp UPX behavioral2/memory/2232-2184-0x00007FF6B40D0000-0x00007FF6B44C2000-memory.dmp UPX behavioral2/memory/12388-2183-0x00007FF761E70000-0x00007FF762262000-memory.dmp UPX -
XMRig Miner payload 9 IoCs
resource yara_rule behavioral2/memory/1416-657-0x00007FF749950000-0x00007FF749D42000-memory.dmp xmrig behavioral2/memory/3388-841-0x00007FF75B310000-0x00007FF75B702000-memory.dmp xmrig behavioral2/memory/2484-845-0x00007FF74EE30000-0x00007FF74F222000-memory.dmp xmrig behavioral2/memory/4936-847-0x00007FF6AA140000-0x00007FF6AA532000-memory.dmp xmrig behavioral2/memory/4692-848-0x00007FF67D960000-0x00007FF67DD52000-memory.dmp xmrig behavioral2/memory/4616-849-0x00007FF70C1B0000-0x00007FF70C5A2000-memory.dmp xmrig behavioral2/memory/384-851-0x00007FF664AD0000-0x00007FF664EC2000-memory.dmp xmrig behavioral2/memory/2408-852-0x00007FF6DFF50000-0x00007FF6E0342000-memory.dmp xmrig behavioral2/memory/4120-853-0x00007FF70DB80000-0x00007FF70DF72000-memory.dmp xmrig -
resource yara_rule behavioral2/memory/3008-0-0x00007FF74DAE0000-0x00007FF74DED2000-memory.dmp upx behavioral2/files/0x0007000000023200-6.dat upx behavioral2/files/0x0007000000023200-25.dat upx behavioral2/files/0x000700000002321e-194.dat upx behavioral2/files/0x000700000002321f-195.dat upx behavioral2/memory/1416-657-0x00007FF749950000-0x00007FF749D42000-memory.dmp upx behavioral2/memory/3388-841-0x00007FF75B310000-0x00007FF75B702000-memory.dmp upx behavioral2/memory/2484-845-0x00007FF74EE30000-0x00007FF74F222000-memory.dmp upx behavioral2/memory/4936-847-0x00007FF6AA140000-0x00007FF6AA532000-memory.dmp upx behavioral2/memory/4692-848-0x00007FF67D960000-0x00007FF67DD52000-memory.dmp upx behavioral2/memory/4616-849-0x00007FF70C1B0000-0x00007FF70C5A2000-memory.dmp upx behavioral2/memory/384-851-0x00007FF664AD0000-0x00007FF664EC2000-memory.dmp upx behavioral2/memory/2408-852-0x00007FF6DFF50000-0x00007FF6E0342000-memory.dmp upx behavioral2/memory/4120-853-0x00007FF70DB80000-0x00007FF70DF72000-memory.dmp upx behavioral2/memory/10748-1563-0x00007FF710310000-0x00007FF710702000-memory.dmp upx behavioral2/memory/1676-1962-0x00007FF748400000-0x00007FF7487F2000-memory.dmp upx behavioral2/memory/9948-2082-0x00007FF776160000-0x00007FF776552000-memory.dmp upx behavioral2/memory/10108-2083-0x00007FF6D4EC0000-0x00007FF6D52B2000-memory.dmp upx behavioral2/memory/12312-2141-0x00007FF72F610000-0x00007FF72FA02000-memory.dmp upx behavioral2/memory/2232-2184-0x00007FF6B40D0000-0x00007FF6B44C2000-memory.dmp upx behavioral2/memory/12388-2183-0x00007FF761E70000-0x00007FF762262000-memory.dmp upx behavioral2/memory/11604-2133-0x00007FF706460000-0x00007FF706852000-memory.dmp upx behavioral2/memory/11444-2132-0x00007FF6F3F40000-0x00007FF6F4332000-memory.dmp upx behavioral2/memory/11428-2130-0x00007FF7B1D90000-0x00007FF7B2182000-memory.dmp upx behavioral2/memory/8748-2127-0x00007FF7CE7E0000-0x00007FF7CEBD2000-memory.dmp upx behavioral2/memory/10904-2126-0x00007FF6C40D0000-0x00007FF6C44C2000-memory.dmp upx behavioral2/memory/11256-2125-0x00007FF710380000-0x00007FF710772000-memory.dmp upx behavioral2/memory/10820-2124-0x00007FF7F8270000-0x00007FF7F8662000-memory.dmp upx
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ea0c382afcdd8b091b5d28e306793bda8438f6a8916cb2c89426d87a1a549a8.exe"C:\Users\Admin\AppData\Local\Temp\7ea0c382afcdd8b091b5d28e306793bda8438f6a8916cb2c89426d87a1a549a8.exe"1⤵PID:3008
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -command "Invoke-WebRequest "https://raw.githubusercontent.com/" "2⤵PID:3484
-
-
C:\Windows\System\hIioTIx.exeC:\Windows\System\hIioTIx.exe2⤵PID:3856
-
-
C:\Windows\System\PKnNARJ.exeC:\Windows\System\PKnNARJ.exe2⤵PID:1644
-
-
C:\Windows\System\oUAQNtz.exeC:\Windows\System\oUAQNtz.exe2⤵PID:3608
-
-
C:\Windows\System\KZUdylr.exeC:\Windows\System\KZUdylr.exe2⤵PID:64
-
-
C:\Windows\System\ddUAXTs.exeC:\Windows\System\ddUAXTs.exe2⤵PID:2260
-
-
C:\Windows\System\sYxroIX.exeC:\Windows\System\sYxroIX.exe2⤵PID:2736
-
-
C:\Windows\System\SIFbwBp.exeC:\Windows\System\SIFbwBp.exe2⤵PID:4544
-
-
C:\Windows\System\eOYFfaV.exeC:\Windows\System\eOYFfaV.exe2⤵PID:3060
-
-
C:\Windows\System\XITWMBy.exeC:\Windows\System\XITWMBy.exe2⤵PID:8176
-
-
C:\Windows\System\aLKyvck.exeC:\Windows\System\aLKyvck.exe2⤵PID:5768
-
-
C:\Windows\System\JrqPJZM.exeC:\Windows\System\JrqPJZM.exe2⤵PID:3656
-
-
C:\Windows\System\XEvSdSD.exeC:\Windows\System\XEvSdSD.exe2⤵PID:12728
-
-
C:\Windows\System\DomzGQr.exeC:\Windows\System\DomzGQr.exe2⤵PID:12744
-
-
C:\Windows\System\HpOtDhS.exeC:\Windows\System\HpOtDhS.exe2⤵PID:12764
-
-
C:\Windows\System\MdHMDXa.exeC:\Windows\System\MdHMDXa.exe2⤵PID:12788
-
-
C:\Windows\System\vCYkNbq.exeC:\Windows\System\vCYkNbq.exe2⤵PID:12804
-
-
C:\Windows\System\FDwbENd.exeC:\Windows\System\FDwbENd.exe2⤵PID:12820
-
-
C:\Windows\System\VaRGrAD.exeC:\Windows\System\VaRGrAD.exe2⤵PID:12840
-
-
C:\Windows\System\vOdsFJO.exeC:\Windows\System\vOdsFJO.exe2⤵PID:12860
-
-
C:\Windows\System\SpSJzRy.exeC:\Windows\System\SpSJzRy.exe2⤵PID:12876
-
-
C:\Windows\System\lODdain.exeC:\Windows\System\lODdain.exe2⤵PID:12892
-
-
C:\Windows\System\wStddAk.exeC:\Windows\System\wStddAk.exe2⤵PID:12912
-
-
C:\Windows\System\mLdZvFA.exeC:\Windows\System\mLdZvFA.exe2⤵PID:12932
-
-
C:\Windows\System\WPstBML.exeC:\Windows\System\WPstBML.exe2⤵PID:12948
-
-
C:\Windows\System\wEEbDcy.exeC:\Windows\System\wEEbDcy.exe2⤵PID:12968
-
-
C:\Windows\System\VCklxWM.exeC:\Windows\System\VCklxWM.exe2⤵PID:12984
-
-
C:\Windows\System\KdEAznM.exeC:\Windows\System\KdEAznM.exe2⤵PID:13004
-
-
C:\Windows\System\LpJoSWc.exeC:\Windows\System\LpJoSWc.exe2⤵PID:13024
-
-
C:\Windows\System\FNsEPkh.exeC:\Windows\System\FNsEPkh.exe2⤵PID:13044
-
-
C:\Windows\System\mEtxKDQ.exeC:\Windows\System\mEtxKDQ.exe2⤵PID:13064
-
-
C:\Windows\System\woehPuT.exeC:\Windows\System\woehPuT.exe2⤵PID:13080
-
-
C:\Windows\System\YpwFdQY.exeC:\Windows\System\YpwFdQY.exe2⤵PID:13100
-
-
C:\Windows\System\OwCrAxT.exeC:\Windows\System\OwCrAxT.exe2⤵PID:13120
-
-
C:\Windows\System\pvZnGZN.exeC:\Windows\System\pvZnGZN.exe2⤵PID:13136
-
-
C:\Windows\System\HuCsVku.exeC:\Windows\System\HuCsVku.exe2⤵PID:13156
-
-
C:\Windows\System\tuTPxGf.exeC:\Windows\System\tuTPxGf.exe2⤵PID:13172
-
-
C:\Windows\System\wjxDwGL.exeC:\Windows\System\wjxDwGL.exe2⤵PID:13192
-
-
C:\Windows\System\PlsuDEi.exeC:\Windows\System\PlsuDEi.exe2⤵PID:13208
-
-
C:\Windows\System\sBZSNPB.exeC:\Windows\System\sBZSNPB.exe2⤵PID:13228
-
-
C:\Windows\System\OCZNqXC.exeC:\Windows\System\OCZNqXC.exe2⤵PID:13248
-
-
C:\Windows\System\EBrLpsw.exeC:\Windows\System\EBrLpsw.exe2⤵PID:13268
-
-
C:\Windows\System\YMnnaUn.exeC:\Windows\System\YMnnaUn.exe2⤵PID:13284
-
-
C:\Windows\System\ijHAGAB.exeC:\Windows\System\ijHAGAB.exe2⤵PID:13300
-
-
C:\Windows\System\zisKCxW.exeC:\Windows\System\zisKCxW.exe2⤵PID:13320
-
-
C:\Windows\System\atVuLgL.exeC:\Windows\System\atVuLgL.exe2⤵PID:13340
-
-
C:\Windows\System\wSTUYnL.exeC:\Windows\System\wSTUYnL.exe2⤵PID:13356
-
-
C:\Windows\System\PrHuNUq.exeC:\Windows\System\PrHuNUq.exe2⤵PID:13376
-
-
C:\Windows\System\wcctVwU.exeC:\Windows\System\wcctVwU.exe2⤵PID:13392
-
-
C:\Windows\System\ziRGnmI.exeC:\Windows\System\ziRGnmI.exe2⤵PID:11964
-
-
C:\Windows\System\feULgIN.exeC:\Windows\System\feULgIN.exe2⤵PID:2316
-
-
C:\Windows\System\HyCYmCF.exeC:\Windows\System\HyCYmCF.exe2⤵PID:12136
-
-
C:\Windows\System\MAdJUCq.exeC:\Windows\System\MAdJUCq.exe2⤵PID:13352
-
-
C:\Windows\System\QbaQrNy.exeC:\Windows\System\QbaQrNy.exe2⤵PID:6368
-
-
C:\Windows\System\bUDFQur.exeC:\Windows\System\bUDFQur.exe2⤵PID:9124
-
-
C:\Windows\System\YMTQHAu.exeC:\Windows\System\YMTQHAu.exe2⤵PID:1692
-
-
C:\Windows\System\XcbzKdt.exeC:\Windows\System\XcbzKdt.exe2⤵PID:2028
-
-
C:\Windows\System\BIwhtZr.exeC:\Windows\System\BIwhtZr.exe2⤵PID:14328
-
-
C:\Windows\System\pukPKPI.exeC:\Windows\System\pukPKPI.exe2⤵PID:13180
-
-
C:\Windows\System\EJRSIFr.exeC:\Windows\System\EJRSIFr.exe2⤵PID:13204
-
-
C:\Windows\System\CgaUzme.exeC:\Windows\System\CgaUzme.exe2⤵PID:13336
-
-
C:\Windows\System\IsxNbQb.exeC:\Windows\System\IsxNbQb.exe2⤵PID:13388
-
-
C:\Windows\System\AynKzcT.exeC:\Windows\System\AynKzcT.exe2⤵PID:13416
-
-
C:\Windows\System\ZSxFCtS.exeC:\Windows\System\ZSxFCtS.exe2⤵PID:10660
-
-
C:\Windows\System\kswNiyi.exeC:\Windows\System\kswNiyi.exe2⤵PID:3128
-
-
C:\Windows\System\CqdUscD.exeC:\Windows\System\CqdUscD.exe2⤵PID:4728
-
-
C:\Windows\System\VzPyYFp.exeC:\Windows\System\VzPyYFp.exe2⤵PID:12088
-
-
C:\Windows\System\YVSvNbZ.exeC:\Windows\System\YVSvNbZ.exe2⤵PID:7120
-
-
C:\Windows\System\bpJlkjd.exeC:\Windows\System\bpJlkjd.exe2⤵PID:2624
-
-
C:\Windows\System\KpJiLFo.exeC:\Windows\System\KpJiLFo.exe2⤵PID:7736
-
-
C:\Windows\System\gezQLDr.exeC:\Windows\System\gezQLDr.exe2⤵PID:8356
-
-
C:\Windows\System\svqiCFy.exeC:\Windows\System\svqiCFy.exe2⤵PID:4832
-
-
C:\Windows\System\VdCVWBr.exeC:\Windows\System\VdCVWBr.exe2⤵PID:9264
-
-
C:\Windows\System\RrXITAV.exeC:\Windows\System\RrXITAV.exe2⤵PID:9316
-
-
C:\Windows\System\xRGxiqA.exeC:\Windows\System\xRGxiqA.exe2⤵PID:9516
-
-
C:\Windows\System\IjoFRBo.exeC:\Windows\System\IjoFRBo.exe2⤵PID:9920
-
-
C:\Windows\System\BtiSBPx.exeC:\Windows\System\BtiSBPx.exe2⤵PID:10064
-
-
C:\Windows\System\LsvHHQw.exeC:\Windows\System\LsvHHQw.exe2⤵PID:10028
-
-
C:\Windows\System\TVSFpVz.exeC:\Windows\System\TVSFpVz.exe2⤵PID:10284
-
-
C:\Windows\System\tbxghnR.exeC:\Windows\System\tbxghnR.exe2⤵PID:10576
-
-
C:\Windows\System\vUmCbaM.exeC:\Windows\System\vUmCbaM.exe2⤵PID:10624
-
-
C:\Windows\System\TytBdYp.exeC:\Windows\System\TytBdYp.exe2⤵PID:8460
-
-
C:\Windows\System\xBZrwAb.exeC:\Windows\System\xBZrwAb.exe2⤵PID:13864
-
-
C:\Windows\System\rFeOzYu.exeC:\Windows\System\rFeOzYu.exe2⤵PID:11996
-
-
C:\Windows\System\TiHBLKx.exeC:\Windows\System\TiHBLKx.exe2⤵PID:14168
-
-
C:\Windows\System\gdMwJlP.exeC:\Windows\System\gdMwJlP.exe2⤵PID:13896
-
-
C:\Windows\System\AmfXWZV.exeC:\Windows\System\AmfXWZV.exe2⤵PID:6768
-
-
C:\Windows\System\CcEPxCM.exeC:\Windows\System\CcEPxCM.exe2⤵PID:7320
-
-
C:\Windows\System\rFxUAKV.exeC:\Windows\System\rFxUAKV.exe2⤵PID:13548
-
-
C:\Windows\System\NtdWobw.exeC:\Windows\System\NtdWobw.exe2⤵PID:11040
-
-
C:\Windows\System\XdvAXVE.exeC:\Windows\System\XdvAXVE.exe2⤵PID:2144
-
-
C:\Windows\System\eGasUIr.exeC:\Windows\System\eGasUIr.exe2⤵PID:14160
-
-
C:\Windows\System\MIrRQDs.exeC:\Windows\System\MIrRQDs.exe2⤵PID:9852
-
-
C:\Windows\System\RrGiAtv.exeC:\Windows\System\RrGiAtv.exe2⤵PID:13624
-
-
C:\Windows\System\eSEsJHj.exeC:\Windows\System\eSEsJHj.exe2⤵PID:13648
-
-
C:\Windows\System\YTeDMnd.exeC:\Windows\System\YTeDMnd.exe2⤵PID:7956
-
-
C:\Windows\System\LqWUcJO.exeC:\Windows\System\LqWUcJO.exe2⤵PID:10812
-
-
C:\Windows\System\ieeKNQy.exeC:\Windows\System\ieeKNQy.exe2⤵PID:11980
-
-
C:\Windows\System\pEOePwD.exeC:\Windows\System\pEOePwD.exe2⤵PID:9884
-
-
C:\Windows\System\UvMHAxx.exeC:\Windows\System\UvMHAxx.exe2⤵PID:8852
-
-
C:\Windows\System\WKAeVrS.exeC:\Windows\System\WKAeVrS.exe2⤵PID:872
-
-
C:\Windows\System\Zrbvjsf.exeC:\Windows\System\Zrbvjsf.exe2⤵PID:4236
-
-
C:\Windows\System\OIsbyCo.exeC:\Windows\System\OIsbyCo.exe2⤵PID:8960
-
-
C:\Windows\System\KrFyCOJ.exeC:\Windows\System\KrFyCOJ.exe2⤵PID:13112
-
-
C:\Windows\System\wTCQEAF.exeC:\Windows\System\wTCQEAF.exe2⤵PID:4004
-
-
C:\Windows\System\vgqHBwK.exeC:\Windows\System\vgqHBwK.exe2⤵PID:8344
-
-
C:\Windows\System\SDdTwir.exeC:\Windows\System\SDdTwir.exe2⤵PID:10376
-
-
C:\Windows\System\uULcIjy.exeC:\Windows\System\uULcIjy.exe2⤵PID:5536
-
-
C:\Windows\System\aihLvuk.exeC:\Windows\System\aihLvuk.exe2⤵PID:1256
-
-
C:\Windows\System\CkYUxRW.exeC:\Windows\System\CkYUxRW.exe2⤵PID:11612
-
-
C:\Windows\System\PfjAdyV.exeC:\Windows\System\PfjAdyV.exe2⤵PID:13348
-
-
C:\Windows\System\rlhWRmJ.exeC:\Windows\System\rlhWRmJ.exe2⤵PID:10640
-
-
C:\Windows\System\ybxuJaq.exeC:\Windows\System\ybxuJaq.exe2⤵PID:840
-
-
C:\Windows\System\vTUuCGz.exeC:\Windows\System\vTUuCGz.exe2⤵PID:9164
-
-
C:\Windows\System\xHlFmzQ.exeC:\Windows\System\xHlFmzQ.exe2⤵PID:12140
-
-
C:\Windows\System\cEpgnTt.exeC:\Windows\System\cEpgnTt.exe2⤵PID:10720
-
-
C:\Windows\System\ITDvsNH.exeC:\Windows\System\ITDvsNH.exe2⤵PID:12324
-
-
C:\Windows\System\WOAoiVH.exeC:\Windows\System\WOAoiVH.exe2⤵PID:4536
-
-
C:\Windows\System\Gbuqwvy.exeC:\Windows\System\Gbuqwvy.exe2⤵PID:3964
-
-
C:\Windows\System\XLXQJXV.exeC:\Windows\System\XLXQJXV.exe2⤵PID:9760
-
-
C:\Windows\System\aCjBDqh.exeC:\Windows\System\aCjBDqh.exe2⤵PID:9460
-
-
C:\Windows\System\hxZBJLx.exeC:\Windows\System\hxZBJLx.exe2⤵PID:14084
-
-
C:\Windows\System\lbqoEIm.exeC:\Windows\System\lbqoEIm.exe2⤵PID:628
-
-
C:\Windows\System\TWtGcHg.exeC:\Windows\System\TWtGcHg.exe2⤵PID:6220
-
-
C:\Windows\System\fLdXlTL.exeC:\Windows\System\fLdXlTL.exe2⤵PID:14288
-
-
C:\Windows\System\tBJcDNb.exeC:\Windows\System\tBJcDNb.exe2⤵PID:4056
-
-
C:\Windows\System\EfXqhAV.exeC:\Windows\System\EfXqhAV.exe2⤵PID:4872
-
-
C:\Windows\System\pOIWTjP.exeC:\Windows\System\pOIWTjP.exe2⤵PID:10496
-
-
C:\Windows\System\xdLsRFA.exeC:\Windows\System\xdLsRFA.exe2⤵PID:12920
-
-
C:\Windows\System\liCYpsk.exeC:\Windows\System\liCYpsk.exe2⤵PID:12412
-
-
C:\Windows\System\AEUbYDq.exeC:\Windows\System\AEUbYDq.exe2⤵PID:1500
-
-
C:\Windows\System\ZgGzBGx.exeC:\Windows\System\ZgGzBGx.exe2⤵PID:7836
-
-
C:\Windows\System\jOuXbNt.exeC:\Windows\System\jOuXbNt.exe2⤵PID:13412
-
-
C:\Windows\System\onkjeYN.exeC:\Windows\System\onkjeYN.exe2⤵PID:1240
-
-
C:\Windows\System\NHrxYsj.exeC:\Windows\System\NHrxYsj.exe2⤵PID:6784
-
-
C:\Windows\System\iiuJvaj.exeC:\Windows\System\iiuJvaj.exe2⤵PID:2668
-
-
C:\Windows\System\OLTMvnY.exeC:\Windows\System\OLTMvnY.exe2⤵PID:12756
-
-
C:\Windows\System\TkeyZdC.exeC:\Windows\System\TkeyZdC.exe2⤵PID:4724
-
-
C:\Windows\System\jlqazhk.exeC:\Windows\System\jlqazhk.exe2⤵PID:12360
-
-
C:\Windows\System\dNWHjkm.exeC:\Windows\System\dNWHjkm.exe2⤵PID:13888
-
-
C:\Windows\System\YDABYDZ.exeC:\Windows\System\YDABYDZ.exe2⤵PID:9532
-
-
C:\Windows\System\SyJvgBV.exeC:\Windows\System\SyJvgBV.exe2⤵PID:7612
-
-
C:\Windows\System\dFROXxc.exeC:\Windows\System\dFROXxc.exe2⤵PID:14092
-
-
C:\Windows\System\jIqZRUi.exeC:\Windows\System\jIqZRUi.exe2⤵PID:6732
-
-
C:\Windows\System\tIovLqn.exeC:\Windows\System\tIovLqn.exe2⤵PID:452
-
-
C:\Windows\System\ainFLaM.exeC:\Windows\System\ainFLaM.exe2⤵PID:3768
-
-
C:\Windows\System\GvZhwcV.exeC:\Windows\System\GvZhwcV.exe2⤵PID:14200
-
-
C:\Windows\System\icgFIkU.exeC:\Windows\System\icgFIkU.exe2⤵PID:13576
-
-
C:\Windows\System\pvpRigh.exeC:\Windows\System\pvpRigh.exe2⤵PID:10032
-
-
C:\Windows\System\pffQaFE.exeC:\Windows\System\pffQaFE.exe2⤵PID:12816
-
-
C:\Windows\System\QTcGauk.exeC:\Windows\System\QTcGauk.exe2⤵PID:8500
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD54faadaeab68805f04a3264b24b4484e7
SHA11506c8fa28d842c0dbf87aa4fae07f0c1d21c224
SHA256023ac7fc351f6d2e4691b22c68fbc17c1895254a67982bf0958242ced6e67f29
SHA512933034705851d18a168ec6a4a2f7a5330c92a605b28011dc44e331b0baa53be92639772e268a3dcd0b9551cd627b9185e234399894d0a898c1ae6ffdbb38edec
-
Filesize
64KB
MD52b844d5b6b62dc9a3481183eddaa5d38
SHA187d636595dfedf6c2d0e0dff07b8562c1756b097
SHA256701fd725195e6f41fa8c30a535b7c6fe836dda87218adae65589c77aac994408
SHA512b48efac78940e6733b31810b8151f5b393d25eb481bcf3aa4f899e0ef27db951cc3620a8ae4658e19daeed7ac299c394da82ad4efd782b4ad07d1d3e507148d9
-
Filesize
320KB
MD5f8515607e38f00a39fa6baf1fde6dd70
SHA101e333a1c1d9a929b5be146b2c47f40aee831176
SHA256950561c68e6cde68beedfdaa6b1c51cd4429220934b59298dc5df8b6902b7efd
SHA512ddf5a2558700cfbc69f6e62bcc458f18de7603a3d72f83dde1a5e666215517a196573730fe8c511f61aa15cb902b6b65cc438cf9feb33984edad2e9144947014