Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 21:55
Static task
static1
Behavioral task
behavioral1
Sample
6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05.exe
Resource
win10v2004-20231215-en
General
-
Target
6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05.exe
-
Size
245KB
-
MD5
cd2679cf087d0795944ffc4a1a4477d7
-
SHA1
00a401a3c3d097ffaba9b4343b648e4c368f5845
-
SHA256
6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05
-
SHA512
ec8d80f211e6404c30e6b6463656f3ab4c3cdc3d0476c0f705d373dd065086bd40bd67015dd74c2c828cd8e9af38f827d27d2b0301568e2c41343a33154e7592
-
SSDEEP
6144:9hbZ5hMTNFf8LAurlEzAX7o5hn8wVSZ2sX0g:vtXMzqrllX7618wc
Malware Config
Signatures
-
Executes dropped EXE 26 IoCs
pid Process 2532 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202.exe 2516 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202a.exe 2428 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202b.exe 2704 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202c.exe 2944 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202d.exe 1680 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202e.exe 2816 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202f.exe 2652 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202g.exe 556 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202h.exe 1860 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202i.exe 784 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202j.exe 1572 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202k.exe 1228 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202l.exe 2980 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202m.exe 2372 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202n.exe 2088 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202o.exe 1404 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202p.exe 1140 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202q.exe 1716 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202r.exe 1540 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202s.exe 2268 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202t.exe 3016 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202u.exe 980 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202v.exe 2344 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202w.exe 1508 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202x.exe 1636 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202y.exe -
Loads dropped DLL 52 IoCs
pid Process 2724 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05.exe 2724 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05.exe 2532 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202.exe 2532 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202.exe 2516 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202a.exe 2516 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202a.exe 2428 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202b.exe 2428 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202b.exe 2704 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202c.exe 2704 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202c.exe 2944 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202d.exe 2944 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202d.exe 1680 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202e.exe 1680 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202e.exe 2816 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202f.exe 2816 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202f.exe 2652 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202g.exe 2652 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202g.exe 556 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202h.exe 556 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202h.exe 1860 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202i.exe 1860 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202i.exe 784 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202j.exe 784 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202j.exe 1572 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202k.exe 1572 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202k.exe 1228 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202l.exe 1228 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202l.exe 2980 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202m.exe 2980 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202m.exe 2372 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202n.exe 2372 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202n.exe 2088 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202o.exe 2088 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202o.exe 1404 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202p.exe 1404 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202p.exe 1140 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202q.exe 1140 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202q.exe 1716 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202r.exe 1716 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202r.exe 1540 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202s.exe 1540 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202s.exe 2268 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202t.exe 2268 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202t.exe 3016 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202u.exe 3016 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202u.exe 980 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202v.exe 980 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202v.exe 2344 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202w.exe 2344 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202w.exe 1508 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202x.exe 1508 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202x.exe -
Adds Run key to start application 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202i.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202h.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202j.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202x.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202w.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202y.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202x.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202d.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202o.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202n.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202p.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202o.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202v.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202u.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202a.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202e.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202g.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202f.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202h.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202g.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202k.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202j.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202m.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202l.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202l.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202k.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202q.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202p.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202r.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202q.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202s.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202r.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202n.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202b.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202c.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202u.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202t.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202w.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202v.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202t.exe\"" 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202s.exe -
Modifies registry class 54 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202i.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202m.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202q.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202d.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202l.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202r.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202v.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202a.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202p.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202v.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202b.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202o.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202s.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202c.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202l.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202p.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202f.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202g.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202i.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202t.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202u.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202y.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202u.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202k.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202e.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202w.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202e.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202x.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202h.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202h.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202j.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202k.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202n.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202s.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202y.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202j.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202a.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202n.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202r.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202t.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202o.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202q.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202w.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202x.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202b.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 003ec5842a0cdfbe 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202g.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202m.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2724 wrote to memory of 2532 2724 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05.exe 28 PID 2724 wrote to memory of 2532 2724 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05.exe 28 PID 2724 wrote to memory of 2532 2724 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05.exe 28 PID 2724 wrote to memory of 2532 2724 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05.exe 28 PID 2532 wrote to memory of 2516 2532 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202.exe 29 PID 2532 wrote to memory of 2516 2532 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202.exe 29 PID 2532 wrote to memory of 2516 2532 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202.exe 29 PID 2532 wrote to memory of 2516 2532 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202.exe 29 PID 2516 wrote to memory of 2428 2516 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202a.exe 30 PID 2516 wrote to memory of 2428 2516 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202a.exe 30 PID 2516 wrote to memory of 2428 2516 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202a.exe 30 PID 2516 wrote to memory of 2428 2516 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202a.exe 30 PID 2428 wrote to memory of 2704 2428 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202b.exe 31 PID 2428 wrote to memory of 2704 2428 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202b.exe 31 PID 2428 wrote to memory of 2704 2428 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202b.exe 31 PID 2428 wrote to memory of 2704 2428 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202b.exe 31 PID 2704 wrote to memory of 2944 2704 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202c.exe 32 PID 2704 wrote to memory of 2944 2704 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202c.exe 32 PID 2704 wrote to memory of 2944 2704 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202c.exe 32 PID 2704 wrote to memory of 2944 2704 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202c.exe 32 PID 2944 wrote to memory of 1680 2944 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202d.exe 33 PID 2944 wrote to memory of 1680 2944 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202d.exe 33 PID 2944 wrote to memory of 1680 2944 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202d.exe 33 PID 2944 wrote to memory of 1680 2944 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202d.exe 33 PID 1680 wrote to memory of 2816 1680 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202e.exe 34 PID 1680 wrote to memory of 2816 1680 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202e.exe 34 PID 1680 wrote to memory of 2816 1680 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202e.exe 34 PID 1680 wrote to memory of 2816 1680 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202e.exe 34 PID 2816 wrote to memory of 2652 2816 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202f.exe 35 PID 2816 wrote to memory of 2652 2816 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202f.exe 35 PID 2816 wrote to memory of 2652 2816 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202f.exe 35 PID 2816 wrote to memory of 2652 2816 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202f.exe 35 PID 2652 wrote to memory of 556 2652 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202g.exe 36 PID 2652 wrote to memory of 556 2652 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202g.exe 36 PID 2652 wrote to memory of 556 2652 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202g.exe 36 PID 2652 wrote to memory of 556 2652 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202g.exe 36 PID 556 wrote to memory of 1860 556 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202h.exe 37 PID 556 wrote to memory of 1860 556 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202h.exe 37 PID 556 wrote to memory of 1860 556 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202h.exe 37 PID 556 wrote to memory of 1860 556 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202h.exe 37 PID 1860 wrote to memory of 784 1860 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202i.exe 38 PID 1860 wrote to memory of 784 1860 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202i.exe 38 PID 1860 wrote to memory of 784 1860 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202i.exe 38 PID 1860 wrote to memory of 784 1860 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202i.exe 38 PID 784 wrote to memory of 1572 784 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202j.exe 39 PID 784 wrote to memory of 1572 784 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202j.exe 39 PID 784 wrote to memory of 1572 784 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202j.exe 39 PID 784 wrote to memory of 1572 784 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202j.exe 39 PID 1572 wrote to memory of 1228 1572 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202k.exe 40 PID 1572 wrote to memory of 1228 1572 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202k.exe 40 PID 1572 wrote to memory of 1228 1572 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202k.exe 40 PID 1572 wrote to memory of 1228 1572 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202k.exe 40 PID 1228 wrote to memory of 2980 1228 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202l.exe 41 PID 1228 wrote to memory of 2980 1228 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202l.exe 41 PID 1228 wrote to memory of 2980 1228 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202l.exe 41 PID 1228 wrote to memory of 2980 1228 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202l.exe 41 PID 2980 wrote to memory of 2372 2980 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202m.exe 42 PID 2980 wrote to memory of 2372 2980 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202m.exe 42 PID 2980 wrote to memory of 2372 2980 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202m.exe 42 PID 2980 wrote to memory of 2372 2980 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202m.exe 42 PID 2372 wrote to memory of 2088 2372 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202n.exe 43 PID 2372 wrote to memory of 2088 2372 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202n.exe 43 PID 2372 wrote to memory of 2088 2372 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202n.exe 43 PID 2372 wrote to memory of 2088 2372 6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202n.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05.exe"C:\Users\Admin\AppData\Local\Temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2532 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202a.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202a.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2516 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202b.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202b.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202c.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202c.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202d.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202d.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2944 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202e.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202e.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1680 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202f.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202f.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2816 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202g.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202g.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2652 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202h.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202h.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:556 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202i.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202i.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1860 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202j.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202j.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:784 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202k.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202k.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1572 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202l.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202l.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1228 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202m.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202m.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2980 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202n.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202n.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2372 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202o.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202o.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:2088 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202p.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202p.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:1404 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202q.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202q.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:1140 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202r.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202r.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:1716 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202s.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202s.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:1540 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202t.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202t.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:2268 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202u.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202u.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:3016 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202v.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202v.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:980 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202w.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202w.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:2344 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202x.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202x.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:1508 -
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202y.exec:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202y.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:1636
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202.exe
Filesize245KB
MD5167b5fa23c4fedebd85941f39051ec70
SHA17c901c1678c5400904492bd50fcdcb7265fc49ec
SHA256b9a7ac0d843099ba53b99d97a0165e7a7df66ab631f6727f89387242fa324fec
SHA512182f19e653b23817b0a946c96dec360eb5bb9a1bc151854e0a8a56455b896af5af991483622bc6eaec72c704870f1332615c50b6a47094500fe883beac00c9ed
-
C:\Users\Admin\AppData\Local\Temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202i.exe
Filesize245KB
MD5481d819a063e8b95c048fdfdfd9f8e22
SHA1bbab7738e52f28c605d4e8ad0cf73ff30cae9bb7
SHA256f46431d5bd650fdd9c9ba13935be1cb0dfa94b518501ab0e86f30d55975e35f9
SHA5121571aa19ee92c9d676dee8680269717f00193afbe77175f77dbaf4db1fbc6da55aa0988b9f28b74d145a66b7d3a0f3496c1c9a561fd57ba0ab637484d86b638e
-
\??\c:\users\admin\appdata\local\temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202k.exe
Filesize245KB
MD51dd510b2b2fb53899bf90066eed23ce7
SHA1f91da5a33b0e2299b7e3dfa03bd675500c3992d0
SHA256673c45d7693391448e477d3b5c0768b7edfa001f04d72718484af399482ba4f2
SHA51220fd518ca1cc6ec6307e895f40e7f81bbf2a81a9a4a6309ce3b9a14b2dd5ce2df540f7cd4b1984073a5240d72d9cb04c8b9036e64a405cf053b4efd042faeeec
-
\Users\Admin\AppData\Local\Temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202b.exe
Filesize245KB
MD5a951577fd6f55f47553595f04af9bb22
SHA13b81c895f9bb08eef4b73e5b1dc1b990ceed3d5b
SHA2561150d9852fdfdefaa682dd7a71105aad6e0fdb155884f619e55d3a4175750fa9
SHA5123f9026bc964c1b2a5fc19d492b48316ca96b5a3c3daa86a3de8f8caba10aab9d3f848def4e7d7783b982ea77f26daacaf536584696e12aad682a190f7422e978
-
\Users\Admin\AppData\Local\Temp\6834b3d1f05fc7c13764d28e5c85caa8b9c9ba52cf0b7c891ef35d3cfe640a05_3202o.exe
Filesize245KB
MD5c3b61ed1bbf8a85069816f94448621e7
SHA15503ff66061119eba82ca200a2cad3c741410f31
SHA256a1e353b4260f6572ed960c10726ec4319899888b0fb0e3580180ad271ca05113
SHA5123e1abd2ab6abe9f4577275e082e5f85079747e810411599a38c347733a398825e5dab40bb40fcb4254784aea01065acaa82aba490be60ce201a9d928805d38aa