Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
123s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
09/04/2024, 21:40
Behavioral task
behavioral1
Sample
1d98ba8157530ff577a80ed8ff9afd36.exe
Resource
win7-20240221-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
1d98ba8157530ff577a80ed8ff9afd36.exe
Resource
win10v2004-20240226-en
6 signatures
150 seconds
General
-
Target
1d98ba8157530ff577a80ed8ff9afd36.exe
-
Size
433KB
-
MD5
1d98ba8157530ff577a80ed8ff9afd36
-
SHA1
98b05bf727f9a5798fff6755c7f121d5d75dc56f
-
SHA256
28783dee2a1cff41e644c6d257cd70700882aa9925c3767770671dfb4b2b1c57
-
SHA512
c31e25bc98ab58974fd605336233c374ba7b1b72a79eec789957bcc4fdeee9e297fdba575197317caf83d589fa15170fb8425f3983539d7f80c9120e61d44dd7
-
SSDEEP
12288:As3xSP86lNxuHwJhfLsLx69sarBP1pl5faA:AshSPwHwPExobD5ff
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2940 95X6F.exe 2560 F5TPI.exe 2688 50DSH.exe 2204 2L32W.exe 528 B61ZU.exe 1176 ZCI57.exe 2716 56156.exe 2240 5VR92.exe 1988 2ZX1S.exe 1244 UNMBO.exe 852 60191.exe 2080 H0FE1.exe 2932 KIDF1.exe 1520 36V35.exe 1820 UTQ39.exe 1328 S941W.exe 2116 R7IZH.exe 2060 6KP8D.exe 2488 9LP37.exe 1056 Y15E4.exe 1712 1Z6XT.exe 2544 NNURW.exe 2528 MR715.exe 2512 D5QTP.exe 2696 N8W57.exe 2396 IXQBN.exe 324 508NI.exe 576 2146T.exe 1104 I6890.exe 2732 55U40.exe 2024 JW6XQ.exe 2040 8CF7Y.exe 2172 L5I41.exe 992 42HK9.exe 1452 1XD30.exe 2996 M04N9.exe 2052 739C7.exe 2932 L3IM3.exe 1972 JZ0SZ.exe 956 86E8C.exe 1228 32990.exe 2164 0IB8G.exe 1504 RY430.exe 2084 8BSO9.exe 1664 81F2G.exe 2600 V072A.exe 2656 B9421.exe 2544 2FPDT.exe 2888 196F3.exe 2540 HG11U.exe 1880 3OCSE.exe 2204 ZHQGA.exe 2680 0LI8Q.exe 2472 CJV6K.exe 2848 25844.exe 1388 67Y9U.exe 540 SQ53A.exe 2208 YV2QA.exe 2288 K30RK.exe 364 YZIAW.exe 1944 W7415.exe 3040 5Y24A.exe 1156 JLV4H.exe 1884 0WEC0.exe -
Loads dropped DLL 64 IoCs
pid Process 2776 1d98ba8157530ff577a80ed8ff9afd36.exe 2776 1d98ba8157530ff577a80ed8ff9afd36.exe 2940 95X6F.exe 2940 95X6F.exe 2560 F5TPI.exe 2560 F5TPI.exe 2688 50DSH.exe 2688 50DSH.exe 2204 2L32W.exe 2204 2L32W.exe 528 B61ZU.exe 528 B61ZU.exe 1176 ZCI57.exe 1176 ZCI57.exe 2716 56156.exe 2716 56156.exe 2240 5VR92.exe 2240 5VR92.exe 1988 2ZX1S.exe 1988 2ZX1S.exe 1244 UNMBO.exe 1244 UNMBO.exe 852 60191.exe 852 60191.exe 2080 H0FE1.exe 2080 H0FE1.exe 2932 KIDF1.exe 2932 KIDF1.exe 1520 36V35.exe 1520 36V35.exe 1820 UTQ39.exe 1820 UTQ39.exe 1328 S941W.exe 1328 S941W.exe 2116 R7IZH.exe 2116 R7IZH.exe 2060 6KP8D.exe 2060 6KP8D.exe 2488 9LP37.exe 2488 9LP37.exe 1056 Y15E4.exe 1056 Y15E4.exe 1712 1Z6XT.exe 1712 1Z6XT.exe 2544 NNURW.exe 2544 NNURW.exe 2528 MR715.exe 2528 MR715.exe 2512 D5QTP.exe 2512 D5QTP.exe 2696 N8W57.exe 2696 N8W57.exe 2396 IXQBN.exe 2396 IXQBN.exe 324 508NI.exe 324 508NI.exe 576 2146T.exe 576 2146T.exe 1104 I6890.exe 1104 I6890.exe 2732 55U40.exe 2732 55U40.exe 2024 JW6XQ.exe 2024 JW6XQ.exe -
resource yara_rule behavioral1/memory/2776-0-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x0009000000012245-3.dat upx behavioral1/memory/2776-10-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2940-12-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x000800000001227d-16.dat upx behavioral1/memory/2560-25-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2940-22-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x0031000000016d57-29.dat upx behavioral1/memory/2560-36-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2688-38-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2688-49-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x0030000000016d61-48.dat upx behavioral1/memory/2204-50-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x0007000000017047-54.dat upx behavioral1/memory/528-63-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x000700000001719d-69.dat upx behavioral1/memory/1176-75-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/528-73-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2204-60-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x000700000001756e-79.dat upx behavioral1/memory/2716-88-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1176-85-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2716-99-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x00070000000186b4-98.dat upx behavioral1/memory/2240-100-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x0007000000018bdb-104.dat upx behavioral1/memory/1988-113-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2240-110-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x0006000000018fca-117.dat upx behavioral1/memory/1244-126-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1988-123-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x0005000000019326-130.dat upx behavioral1/memory/852-139-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1244-136-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x0005000000019334-143.dat upx behavioral1/memory/852-149-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2080-151-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x000500000001939c-155.dat upx behavioral1/memory/2080-161-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2932-164-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x00050000000193af-168.dat upx behavioral1/memory/2932-175-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1520-176-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x00050000000193c3-180.dat upx behavioral1/memory/1520-187-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1820-198-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x000500000001946d-197.dat upx behavioral1/memory/1820-199-0x0000000003440000-0x000000000357B000-memory.dmp upx behavioral1/memory/1328-200-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1328-208-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2116-209-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2060-217-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2116-216-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2060-224-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2488-226-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2060-225-0x00000000036F0000-0x000000000382B000-memory.dmp upx behavioral1/memory/2488-233-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1056-234-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1056-241-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1712-242-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1712-249-0x00000000035F0000-0x000000000372B000-memory.dmp upx behavioral1/memory/2544-251-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1712-250-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2544-258-0x0000000003560000-0x000000000369B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2776 1d98ba8157530ff577a80ed8ff9afd36.exe 2776 1d98ba8157530ff577a80ed8ff9afd36.exe 2940 95X6F.exe 2940 95X6F.exe 2560 F5TPI.exe 2560 F5TPI.exe 2688 50DSH.exe 2688 50DSH.exe 2204 2L32W.exe 2204 2L32W.exe 528 B61ZU.exe 528 B61ZU.exe 1176 ZCI57.exe 1176 ZCI57.exe 2716 56156.exe 2716 56156.exe 2240 5VR92.exe 2240 5VR92.exe 1988 2ZX1S.exe 1988 2ZX1S.exe 1244 UNMBO.exe 1244 UNMBO.exe 852 60191.exe 852 60191.exe 2080 H0FE1.exe 2080 H0FE1.exe 2932 KIDF1.exe 2932 KIDF1.exe 1520 36V35.exe 1520 36V35.exe 1820 UTQ39.exe 1820 UTQ39.exe 1328 S941W.exe 1328 S941W.exe 2116 R7IZH.exe 2116 R7IZH.exe 2060 6KP8D.exe 2060 6KP8D.exe 2488 9LP37.exe 2488 9LP37.exe 1056 Y15E4.exe 1056 Y15E4.exe 1712 1Z6XT.exe 1712 1Z6XT.exe 2544 NNURW.exe 2544 NNURW.exe 2528 MR715.exe 2528 MR715.exe 2512 D5QTP.exe 2512 D5QTP.exe 2696 N8W57.exe 2696 N8W57.exe 2396 IXQBN.exe 2396 IXQBN.exe 324 508NI.exe 324 508NI.exe 576 2146T.exe 576 2146T.exe 1104 I6890.exe 1104 I6890.exe 2732 55U40.exe 2732 55U40.exe 2024 JW6XQ.exe 2024 JW6XQ.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2940 2776 1d98ba8157530ff577a80ed8ff9afd36.exe 28 PID 2776 wrote to memory of 2940 2776 1d98ba8157530ff577a80ed8ff9afd36.exe 28 PID 2776 wrote to memory of 2940 2776 1d98ba8157530ff577a80ed8ff9afd36.exe 28 PID 2776 wrote to memory of 2940 2776 1d98ba8157530ff577a80ed8ff9afd36.exe 28 PID 2940 wrote to memory of 2560 2940 95X6F.exe 29 PID 2940 wrote to memory of 2560 2940 95X6F.exe 29 PID 2940 wrote to memory of 2560 2940 95X6F.exe 29 PID 2940 wrote to memory of 2560 2940 95X6F.exe 29 PID 2560 wrote to memory of 2688 2560 F5TPI.exe 30 PID 2560 wrote to memory of 2688 2560 F5TPI.exe 30 PID 2560 wrote to memory of 2688 2560 F5TPI.exe 30 PID 2560 wrote to memory of 2688 2560 F5TPI.exe 30 PID 2688 wrote to memory of 2204 2688 50DSH.exe 31 PID 2688 wrote to memory of 2204 2688 50DSH.exe 31 PID 2688 wrote to memory of 2204 2688 50DSH.exe 31 PID 2688 wrote to memory of 2204 2688 50DSH.exe 31 PID 2204 wrote to memory of 528 2204 2L32W.exe 32 PID 2204 wrote to memory of 528 2204 2L32W.exe 32 PID 2204 wrote to memory of 528 2204 2L32W.exe 32 PID 2204 wrote to memory of 528 2204 2L32W.exe 32 PID 528 wrote to memory of 1176 528 B61ZU.exe 33 PID 528 wrote to memory of 1176 528 B61ZU.exe 33 PID 528 wrote to memory of 1176 528 B61ZU.exe 33 PID 528 wrote to memory of 1176 528 B61ZU.exe 33 PID 1176 wrote to memory of 2716 1176 ZCI57.exe 34 PID 1176 wrote to memory of 2716 1176 ZCI57.exe 34 PID 1176 wrote to memory of 2716 1176 ZCI57.exe 34 PID 1176 wrote to memory of 2716 1176 ZCI57.exe 34 PID 2716 wrote to memory of 2240 2716 56156.exe 35 PID 2716 wrote to memory of 2240 2716 56156.exe 35 PID 2716 wrote to memory of 2240 2716 56156.exe 35 PID 2716 wrote to memory of 2240 2716 56156.exe 35 PID 2240 wrote to memory of 1988 2240 5VR92.exe 36 PID 2240 wrote to memory of 1988 2240 5VR92.exe 36 PID 2240 wrote to memory of 1988 2240 5VR92.exe 36 PID 2240 wrote to memory of 1988 2240 5VR92.exe 36 PID 1988 wrote to memory of 1244 1988 2ZX1S.exe 37 PID 1988 wrote to memory of 1244 1988 2ZX1S.exe 37 PID 1988 wrote to memory of 1244 1988 2ZX1S.exe 37 PID 1988 wrote to memory of 1244 1988 2ZX1S.exe 37 PID 1244 wrote to memory of 852 1244 UNMBO.exe 38 PID 1244 wrote to memory of 852 1244 UNMBO.exe 38 PID 1244 wrote to memory of 852 1244 UNMBO.exe 38 PID 1244 wrote to memory of 852 1244 UNMBO.exe 38 PID 852 wrote to memory of 2080 852 60191.exe 39 PID 852 wrote to memory of 2080 852 60191.exe 39 PID 852 wrote to memory of 2080 852 60191.exe 39 PID 852 wrote to memory of 2080 852 60191.exe 39 PID 2080 wrote to memory of 2932 2080 H0FE1.exe 40 PID 2080 wrote to memory of 2932 2080 H0FE1.exe 40 PID 2080 wrote to memory of 2932 2080 H0FE1.exe 40 PID 2080 wrote to memory of 2932 2080 H0FE1.exe 40 PID 2932 wrote to memory of 1520 2932 KIDF1.exe 41 PID 2932 wrote to memory of 1520 2932 KIDF1.exe 41 PID 2932 wrote to memory of 1520 2932 KIDF1.exe 41 PID 2932 wrote to memory of 1520 2932 KIDF1.exe 41 PID 1520 wrote to memory of 1820 1520 36V35.exe 42 PID 1520 wrote to memory of 1820 1520 36V35.exe 42 PID 1520 wrote to memory of 1820 1520 36V35.exe 42 PID 1520 wrote to memory of 1820 1520 36V35.exe 42 PID 1820 wrote to memory of 1328 1820 UTQ39.exe 43 PID 1820 wrote to memory of 1328 1820 UTQ39.exe 43 PID 1820 wrote to memory of 1328 1820 UTQ39.exe 43 PID 1820 wrote to memory of 1328 1820 UTQ39.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d98ba8157530ff577a80ed8ff9afd36.exe"C:\Users\Admin\AppData\Local\Temp\1d98ba8157530ff577a80ed8ff9afd36.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\95X6F.exe"C:\Users\Admin\AppData\Local\Temp\95X6F.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\F5TPI.exe"C:\Users\Admin\AppData\Local\Temp\F5TPI.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\50DSH.exe"C:\Users\Admin\AppData\Local\Temp\50DSH.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\2L32W.exe"C:\Users\Admin\AppData\Local\Temp\2L32W.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\B61ZU.exe"C:\Users\Admin\AppData\Local\Temp\B61ZU.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Users\Admin\AppData\Local\Temp\ZCI57.exe"C:\Users\Admin\AppData\Local\Temp\ZCI57.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\56156.exe"C:\Users\Admin\AppData\Local\Temp\56156.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\5VR92.exe"C:\Users\Admin\AppData\Local\Temp\5VR92.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\2ZX1S.exe"C:\Users\Admin\AppData\Local\Temp\2ZX1S.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\UNMBO.exe"C:\Users\Admin\AppData\Local\Temp\UNMBO.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\60191.exe"C:\Users\Admin\AppData\Local\Temp\60191.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\H0FE1.exe"C:\Users\Admin\AppData\Local\Temp\H0FE1.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\KIDF1.exe"C:\Users\Admin\AppData\Local\Temp\KIDF1.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\36V35.exe"C:\Users\Admin\AppData\Local\Temp\36V35.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\UTQ39.exe"C:\Users\Admin\AppData\Local\Temp\UTQ39.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\S941W.exe"C:\Users\Admin\AppData\Local\Temp\S941W.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\R7IZH.exe"C:\Users\Admin\AppData\Local\Temp\R7IZH.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\6KP8D.exe"C:\Users\Admin\AppData\Local\Temp\6KP8D.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\9LP37.exe"C:\Users\Admin\AppData\Local\Temp\9LP37.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\Y15E4.exe"C:\Users\Admin\AppData\Local\Temp\Y15E4.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\1Z6XT.exe"C:\Users\Admin\AppData\Local\Temp\1Z6XT.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\NNURW.exe"C:\Users\Admin\AppData\Local\Temp\NNURW.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\MR715.exe"C:\Users\Admin\AppData\Local\Temp\MR715.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\D5QTP.exe"C:\Users\Admin\AppData\Local\Temp\D5QTP.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\N8W57.exe"C:\Users\Admin\AppData\Local\Temp\N8W57.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\IXQBN.exe"C:\Users\Admin\AppData\Local\Temp\IXQBN.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\508NI.exe"C:\Users\Admin\AppData\Local\Temp\508NI.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:324 -
C:\Users\Admin\AppData\Local\Temp\2146T.exe"C:\Users\Admin\AppData\Local\Temp\2146T.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:576 -
C:\Users\Admin\AppData\Local\Temp\I6890.exe"C:\Users\Admin\AppData\Local\Temp\I6890.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\55U40.exe"C:\Users\Admin\AppData\Local\Temp\55U40.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\JW6XQ.exe"C:\Users\Admin\AppData\Local\Temp\JW6XQ.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\8CF7Y.exe"C:\Users\Admin\AppData\Local\Temp\8CF7Y.exe"33⤵
- Executes dropped EXE
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\L5I41.exe"C:\Users\Admin\AppData\Local\Temp\L5I41.exe"34⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\42HK9.exe"C:\Users\Admin\AppData\Local\Temp\42HK9.exe"35⤵
- Executes dropped EXE
PID:992 -
C:\Users\Admin\AppData\Local\Temp\1XD30.exe"C:\Users\Admin\AppData\Local\Temp\1XD30.exe"36⤵
- Executes dropped EXE
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\M04N9.exe"C:\Users\Admin\AppData\Local\Temp\M04N9.exe"37⤵
- Executes dropped EXE
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\739C7.exe"C:\Users\Admin\AppData\Local\Temp\739C7.exe"38⤵
- Executes dropped EXE
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\L3IM3.exe"C:\Users\Admin\AppData\Local\Temp\L3IM3.exe"39⤵
- Executes dropped EXE
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\JZ0SZ.exe"C:\Users\Admin\AppData\Local\Temp\JZ0SZ.exe"40⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\86E8C.exe"C:\Users\Admin\AppData\Local\Temp\86E8C.exe"41⤵
- Executes dropped EXE
PID:956 -
C:\Users\Admin\AppData\Local\Temp\32990.exe"C:\Users\Admin\AppData\Local\Temp\32990.exe"42⤵
- Executes dropped EXE
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\0IB8G.exe"C:\Users\Admin\AppData\Local\Temp\0IB8G.exe"43⤵
- Executes dropped EXE
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\RY430.exe"C:\Users\Admin\AppData\Local\Temp\RY430.exe"44⤵
- Executes dropped EXE
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\8BSO9.exe"C:\Users\Admin\AppData\Local\Temp\8BSO9.exe"45⤵
- Executes dropped EXE
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\81F2G.exe"C:\Users\Admin\AppData\Local\Temp\81F2G.exe"46⤵
- Executes dropped EXE
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\V072A.exe"C:\Users\Admin\AppData\Local\Temp\V072A.exe"47⤵
- Executes dropped EXE
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\B9421.exe"C:\Users\Admin\AppData\Local\Temp\B9421.exe"48⤵
- Executes dropped EXE
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\2FPDT.exe"C:\Users\Admin\AppData\Local\Temp\2FPDT.exe"49⤵
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\196F3.exe"C:\Users\Admin\AppData\Local\Temp\196F3.exe"50⤵
- Executes dropped EXE
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\HG11U.exe"C:\Users\Admin\AppData\Local\Temp\HG11U.exe"51⤵
- Executes dropped EXE
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\3OCSE.exe"C:\Users\Admin\AppData\Local\Temp\3OCSE.exe"52⤵
- Executes dropped EXE
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\ZHQGA.exe"C:\Users\Admin\AppData\Local\Temp\ZHQGA.exe"53⤵
- Executes dropped EXE
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\0LI8Q.exe"C:\Users\Admin\AppData\Local\Temp\0LI8Q.exe"54⤵
- Executes dropped EXE
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\CJV6K.exe"C:\Users\Admin\AppData\Local\Temp\CJV6K.exe"55⤵
- Executes dropped EXE
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\25844.exe"C:\Users\Admin\AppData\Local\Temp\25844.exe"56⤵
- Executes dropped EXE
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\67Y9U.exe"C:\Users\Admin\AppData\Local\Temp\67Y9U.exe"57⤵
- Executes dropped EXE
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\SQ53A.exe"C:\Users\Admin\AppData\Local\Temp\SQ53A.exe"58⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\YV2QA.exe"C:\Users\Admin\AppData\Local\Temp\YV2QA.exe"59⤵
- Executes dropped EXE
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\K30RK.exe"C:\Users\Admin\AppData\Local\Temp\K30RK.exe"60⤵
- Executes dropped EXE
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\YZIAW.exe"C:\Users\Admin\AppData\Local\Temp\YZIAW.exe"61⤵
- Executes dropped EXE
PID:364 -
C:\Users\Admin\AppData\Local\Temp\W7415.exe"C:\Users\Admin\AppData\Local\Temp\W7415.exe"62⤵
- Executes dropped EXE
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\5Y24A.exe"C:\Users\Admin\AppData\Local\Temp\5Y24A.exe"63⤵
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\JLV4H.exe"C:\Users\Admin\AppData\Local\Temp\JLV4H.exe"64⤵
- Executes dropped EXE
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\0WEC0.exe"C:\Users\Admin\AppData\Local\Temp\0WEC0.exe"65⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\C9FDH.exe"C:\Users\Admin\AppData\Local\Temp\C9FDH.exe"66⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\4OCGU.exe"C:\Users\Admin\AppData\Local\Temp\4OCGU.exe"67⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\T05IM.exe"C:\Users\Admin\AppData\Local\Temp\T05IM.exe"68⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\6XJ3Z.exe"C:\Users\Admin\AppData\Local\Temp\6XJ3Z.exe"69⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\Z0NQL.exe"C:\Users\Admin\AppData\Local\Temp\Z0NQL.exe"70⤵PID:896
-
C:\Users\Admin\AppData\Local\Temp\I5FC5.exe"C:\Users\Admin\AppData\Local\Temp\I5FC5.exe"71⤵PID:2036
-
C:\Users\Admin\AppData\Local\Temp\3AFBS.exe"C:\Users\Admin\AppData\Local\Temp\3AFBS.exe"72⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\7W7JZ.exe"C:\Users\Admin\AppData\Local\Temp\7W7JZ.exe"73⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\GVF3I.exe"C:\Users\Admin\AppData\Local\Temp\GVF3I.exe"74⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\OQM34.exe"C:\Users\Admin\AppData\Local\Temp\OQM34.exe"75⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\505D5.exe"C:\Users\Admin\AppData\Local\Temp\505D5.exe"76⤵PID:268
-
C:\Users\Admin\AppData\Local\Temp\P7I97.exe"C:\Users\Admin\AppData\Local\Temp\P7I97.exe"77⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\63685.exe"C:\Users\Admin\AppData\Local\Temp\63685.exe"78⤵PID:288
-
C:\Users\Admin\AppData\Local\Temp\1DA0H.exe"C:\Users\Admin\AppData\Local\Temp\1DA0H.exe"79⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\FP26T.exe"C:\Users\Admin\AppData\Local\Temp\FP26T.exe"80⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\253I3.exe"C:\Users\Admin\AppData\Local\Temp\253I3.exe"81⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\QH1SR.exe"C:\Users\Admin\AppData\Local\Temp\QH1SR.exe"82⤵PID:2280
-
C:\Users\Admin\AppData\Local\Temp\U4476.exe"C:\Users\Admin\AppData\Local\Temp\U4476.exe"83⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\8MRSV.exe"C:\Users\Admin\AppData\Local\Temp\8MRSV.exe"84⤵PID:1612
-
C:\Users\Admin\AppData\Local\Temp\BOZ59.exe"C:\Users\Admin\AppData\Local\Temp\BOZ59.exe"85⤵PID:2092
-
C:\Users\Admin\AppData\Local\Temp\T0H1S.exe"C:\Users\Admin\AppData\Local\Temp\T0H1S.exe"86⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\L1GKF.exe"C:\Users\Admin\AppData\Local\Temp\L1GKF.exe"87⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\R759M.exe"C:\Users\Admin\AppData\Local\Temp\R759M.exe"88⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\WHGEN.exe"C:\Users\Admin\AppData\Local\Temp\WHGEN.exe"89⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\M424Q.exe"C:\Users\Admin\AppData\Local\Temp\M424Q.exe"90⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\0PSXG.exe"C:\Users\Admin\AppData\Local\Temp\0PSXG.exe"91⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\E97R4.exe"C:\Users\Admin\AppData\Local\Temp\E97R4.exe"92⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\6EGU8.exe"C:\Users\Admin\AppData\Local\Temp\6EGU8.exe"93⤵PID:544
-
C:\Users\Admin\AppData\Local\Temp\UBX9K.exe"C:\Users\Admin\AppData\Local\Temp\UBX9K.exe"94⤵PID:892
-
C:\Users\Admin\AppData\Local\Temp\50CPE.exe"C:\Users\Admin\AppData\Local\Temp\50CPE.exe"95⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\31068.exe"C:\Users\Admin\AppData\Local\Temp\31068.exe"96⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\ITBWR.exe"C:\Users\Admin\AppData\Local\Temp\ITBWR.exe"97⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\H48EY.exe"C:\Users\Admin\AppData\Local\Temp\H48EY.exe"98⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\3M2LR.exe"C:\Users\Admin\AppData\Local\Temp\3M2LR.exe"99⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\9WVXS.exe"C:\Users\Admin\AppData\Local\Temp\9WVXS.exe"100⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\564FZ.exe"C:\Users\Admin\AppData\Local\Temp\564FZ.exe"101⤵PID:2396
-
C:\Users\Admin\AppData\Local\Temp\RO3R4.exe"C:\Users\Admin\AppData\Local\Temp\RO3R4.exe"102⤵PID:812
-
C:\Users\Admin\AppData\Local\Temp\0F98F.exe"C:\Users\Admin\AppData\Local\Temp\0F98F.exe"103⤵PID:1572
-
C:\Users\Admin\AppData\Local\Temp\68064.exe"C:\Users\Admin\AppData\Local\Temp\68064.exe"104⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\477OX.exe"C:\Users\Admin\AppData\Local\Temp\477OX.exe"105⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\0GWA1.exe"C:\Users\Admin\AppData\Local\Temp\0GWA1.exe"106⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\EI25G.exe"C:\Users\Admin\AppData\Local\Temp\EI25G.exe"107⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\3C7ZK.exe"C:\Users\Admin\AppData\Local\Temp\3C7ZK.exe"108⤵PID:1676
-
C:\Users\Admin\AppData\Local\Temp\477GL.exe"C:\Users\Admin\AppData\Local\Temp\477GL.exe"109⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\MCRKY.exe"C:\Users\Admin\AppData\Local\Temp\MCRKY.exe"110⤵PID:2812
-
C:\Users\Admin\AppData\Local\Temp\090V6.exe"C:\Users\Admin\AppData\Local\Temp\090V6.exe"111⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\545A9.exe"C:\Users\Admin\AppData\Local\Temp\545A9.exe"112⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\12G06.exe"C:\Users\Admin\AppData\Local\Temp\12G06.exe"113⤵PID:2068
-
C:\Users\Admin\AppData\Local\Temp\7TO8B.exe"C:\Users\Admin\AppData\Local\Temp\7TO8B.exe"114⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\S8W5A.exe"C:\Users\Admin\AppData\Local\Temp\S8W5A.exe"115⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\68HEJ.exe"C:\Users\Admin\AppData\Local\Temp\68HEJ.exe"116⤵PID:1324
-
C:\Users\Admin\AppData\Local\Temp\GL8X9.exe"C:\Users\Admin\AppData\Local\Temp\GL8X9.exe"117⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\H08JG.exe"C:\Users\Admin\AppData\Local\Temp\H08JG.exe"118⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\C31S7.exe"C:\Users\Admin\AppData\Local\Temp\C31S7.exe"119⤵PID:2188
-
C:\Users\Admin\AppData\Local\Temp\BFMSJ.exe"C:\Users\Admin\AppData\Local\Temp\BFMSJ.exe"120⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\3YI86.exe"C:\Users\Admin\AppData\Local\Temp\3YI86.exe"121⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\G09JD.exe"C:\Users\Admin\AppData\Local\Temp\G09JD.exe"122⤵PID:2684
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-