Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14-06-2024 18:33
Behavioral task
behavioral1
Sample
09d4641332335177ea776f747a31a35e2e16ea585d3335bd7484c27c732dd6e1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
09d4641332335177ea776f747a31a35e2e16ea585d3335bd7484c27c732dd6e1.exe
Resource
win10v2004-20240508-en
General
-
Target
09d4641332335177ea776f747a31a35e2e16ea585d3335bd7484c27c732dd6e1.exe
-
Size
1.2MB
-
MD5
05c093e3a57b07764672ee99fb66a218
-
SHA1
be328478b0e4829a1f0ae61c8292b1225a855cb8
-
SHA256
09d4641332335177ea776f747a31a35e2e16ea585d3335bd7484c27c732dd6e1
-
SHA512
a0393f78679356e72af51b6fb0cf2d85b5f88349b17e0dee56232f90f27f07ebe5e59c5ee4ab003c848f70f7bdf3502495f633a6bd10a3c81703b766d2f5beee
-
SSDEEP
24576:UqylFH50Dv6RwyeQvt6ot0h9HyrOmiruAx:LylFHUv6ReIt0jSrOB
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 64 IoCs
resource yara_rule behavioral1/memory/836-0-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/files/0x00090000000141e6-3.dat UPX behavioral1/memory/836-10-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/2320-11-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/files/0x000900000001447e-15.dat UPX behavioral1/memory/2320-22-0x00000000037E0000-0x000000000391B000-memory.dmp UPX behavioral1/memory/2320-21-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/files/0x0008000000014539-27.dat UPX behavioral1/memory/1468-37-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/files/0x0007000000014667-39.dat UPX behavioral1/memory/2668-45-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/files/0x000900000001448a-50.dat UPX behavioral1/memory/2704-57-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/2304-58-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/files/0x00070000000146a2-62.dat UPX behavioral1/memory/2320-64-0x00000000037E0000-0x000000000391B000-memory.dmp UPX behavioral1/memory/2704-70-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/2904-72-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/files/0x000a0000000146b8-76.dat UPX behavioral1/memory/1588-84-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/2904-83-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/files/0x00090000000147ea-88.dat UPX behavioral1/memory/1588-95-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/1692-106-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/files/0x000a000000014825-105.dat UPX behavioral1/memory/1992-107-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/files/0x00070000000149f5-111.dat UPX behavioral1/memory/1992-118-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/files/0x0007000000014abe-122.dat UPX behavioral1/memory/2108-128-0x0000000003910000-0x0000000003A4B000-memory.dmp UPX behavioral1/memory/2108-130-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/1772-131-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/files/0x0007000000014af6-135.dat UPX behavioral1/memory/2296-143-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/1772-142-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/files/0x0006000000014b31-147.dat UPX behavioral1/memory/2296-156-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/files/0x0006000000014b70-160.dat UPX behavioral1/memory/384-169-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/files/0x0006000000014de9-173.dat UPX behavioral1/memory/2224-182-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/1444-181-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/files/0x0006000000014ef8-186.dat UPX behavioral1/memory/2224-193-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/1152-202-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/2084-201-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/1152-209-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/2960-216-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/2192-217-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/3068-225-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/2192-224-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/3068-232-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/1672-233-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/1672-240-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/1600-241-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/1600-248-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/1808-249-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/2544-258-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/1808-257-0x0000000003890000-0x00000000039CB000-memory.dmp UPX behavioral1/memory/1808-256-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/2544-265-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/2588-266-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/2588-273-0x0000000000400000-0x000000000053B000-memory.dmp UPX behavioral1/memory/2212-274-0x0000000000400000-0x000000000053B000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
pid Process 2320 7MGWH.exe 1468 XU8MR.exe 2668 EI097.exe 2304 GD5R5.exe 2704 5KA12.exe 2904 X8A91.exe 1588 054BW.exe 1692 M56QG.exe 1992 T9Y28.exe 2108 B6G24.exe 1772 9LS3B.exe 2296 20H85.exe 384 K02X2.exe 1444 DK006.exe 2224 KGZRV.exe 2084 6895O.exe 1152 L01L1.exe 2960 4R8M7.exe 2192 I6NJ9.exe 3068 4Z6KQ.exe 1672 2V2RO.exe 1600 92AC9.exe 1808 18DYT.exe 2544 553PI.exe 2588 GR7W1.exe 2212 H9504.exe 2584 AN0NI.exe 2024 X3I1U.exe 2780 N9094.exe 3052 4055K.exe 1820 9QYOI.exe 1800 OI6A6.exe 1684 Y89ZE.exe 1692 5YKTC.exe 1656 175T7.exe 1540 05M2U.exe 1472 0QJX3.exe 2700 70LBS.exe 1960 3V9N4.exe 2296 H3Z1O.exe 1452 5570O.exe 560 87566.exe 1628 U79RS.exe 1444 FE6V1.exe 3012 LRO73.exe 1676 67I3D.exe 1792 PC6TK.exe 1844 1H7W7.exe 1728 8IG40.exe 2144 9W7K6.exe 888 J99K8.exe 1612 N501I.exe 1608 5F3SY.exe 2808 Z3ID1.exe 2964 Z3053.exe 2544 7GYED.exe 2652 71UW0.exe 2976 GC3YG.exe 2572 8737Q.exe 2304 S9337.exe 2972 YLZ1L.exe 1584 8Y6H0.exe 1664 1FNZP.exe 1872 M165Z.exe -
Loads dropped DLL 64 IoCs
pid Process 836 09d4641332335177ea776f747a31a35e2e16ea585d3335bd7484c27c732dd6e1.exe 836 09d4641332335177ea776f747a31a35e2e16ea585d3335bd7484c27c732dd6e1.exe 2320 7MGWH.exe 2320 7MGWH.exe 1468 XU8MR.exe 1468 XU8MR.exe 2668 EI097.exe 2668 EI097.exe 2304 GD5R5.exe 2304 GD5R5.exe 2704 5KA12.exe 2704 5KA12.exe 2904 X8A91.exe 2904 X8A91.exe 1588 054BW.exe 1588 054BW.exe 1692 M56QG.exe 1692 M56QG.exe 1992 T9Y28.exe 1992 T9Y28.exe 2108 B6G24.exe 2108 B6G24.exe 1772 9LS3B.exe 1772 9LS3B.exe 2296 20H85.exe 2296 20H85.exe 384 K02X2.exe 384 K02X2.exe 1444 DK006.exe 1444 DK006.exe 2224 KGZRV.exe 2224 KGZRV.exe 2084 6895O.exe 2084 6895O.exe 1152 L01L1.exe 1152 L01L1.exe 2960 4R8M7.exe 2960 4R8M7.exe 2192 I6NJ9.exe 2192 I6NJ9.exe 3068 4Z6KQ.exe 3068 4Z6KQ.exe 1672 2V2RO.exe 1672 2V2RO.exe 1600 92AC9.exe 1600 92AC9.exe 1808 18DYT.exe 1808 18DYT.exe 2544 553PI.exe 2544 553PI.exe 2588 GR7W1.exe 2588 GR7W1.exe 2212 H9504.exe 2212 H9504.exe 2584 AN0NI.exe 2584 AN0NI.exe 2024 X3I1U.exe 2024 X3I1U.exe 2780 N9094.exe 2780 N9094.exe 3052 4055K.exe 3052 4055K.exe 1820 9QYOI.exe 1820 9QYOI.exe -
resource yara_rule behavioral1/memory/836-0-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x00090000000141e6-3.dat upx behavioral1/memory/836-10-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2320-11-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x000900000001447e-15.dat upx behavioral1/memory/2320-22-0x00000000037E0000-0x000000000391B000-memory.dmp upx behavioral1/memory/2320-21-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x0008000000014539-27.dat upx behavioral1/memory/1468-37-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x0007000000014667-39.dat upx behavioral1/memory/2668-45-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x000900000001448a-50.dat upx behavioral1/memory/2704-57-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2304-58-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x00070000000146a2-62.dat upx behavioral1/memory/2320-64-0x00000000037E0000-0x000000000391B000-memory.dmp upx behavioral1/memory/2704-70-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2904-72-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x000a0000000146b8-76.dat upx behavioral1/memory/1588-84-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2904-83-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x00090000000147ea-88.dat upx behavioral1/memory/1588-95-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1692-106-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x000a000000014825-105.dat upx behavioral1/memory/1992-107-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x00070000000149f5-111.dat upx behavioral1/memory/1992-118-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x0007000000014abe-122.dat upx behavioral1/memory/2108-128-0x0000000003910000-0x0000000003A4B000-memory.dmp upx behavioral1/memory/2108-130-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1772-131-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x0007000000014af6-135.dat upx behavioral1/memory/2296-143-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1772-142-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x0006000000014b31-147.dat upx behavioral1/memory/2296-156-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x0006000000014b70-160.dat upx behavioral1/memory/384-169-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x0006000000014de9-173.dat upx behavioral1/memory/2224-182-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1444-181-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/files/0x0006000000014ef8-186.dat upx behavioral1/memory/2224-193-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1152-202-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2084-201-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1152-209-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2960-216-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2192-217-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/3068-225-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2192-224-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/3068-232-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1672-233-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1672-240-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1600-241-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1600-248-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1808-249-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2544-258-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/1808-257-0x0000000003890000-0x00000000039CB000-memory.dmp upx behavioral1/memory/1808-256-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2544-265-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2588-266-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2588-273-0x0000000000400000-0x000000000053B000-memory.dmp upx behavioral1/memory/2212-274-0x0000000000400000-0x000000000053B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 836 09d4641332335177ea776f747a31a35e2e16ea585d3335bd7484c27c732dd6e1.exe 836 09d4641332335177ea776f747a31a35e2e16ea585d3335bd7484c27c732dd6e1.exe 2320 7MGWH.exe 2320 7MGWH.exe 1468 XU8MR.exe 1468 XU8MR.exe 2668 EI097.exe 2668 EI097.exe 2304 GD5R5.exe 2304 GD5R5.exe 2704 5KA12.exe 2704 5KA12.exe 2904 X8A91.exe 2904 X8A91.exe 1588 054BW.exe 1588 054BW.exe 1692 M56QG.exe 1692 M56QG.exe 1992 T9Y28.exe 1992 T9Y28.exe 2108 B6G24.exe 2108 B6G24.exe 1772 9LS3B.exe 1772 9LS3B.exe 2296 20H85.exe 2296 20H85.exe 384 K02X2.exe 384 K02X2.exe 1444 DK006.exe 1444 DK006.exe 2224 KGZRV.exe 2224 KGZRV.exe 2084 6895O.exe 2084 6895O.exe 1152 L01L1.exe 1152 L01L1.exe 2960 4R8M7.exe 2960 4R8M7.exe 2192 I6NJ9.exe 2192 I6NJ9.exe 3068 4Z6KQ.exe 3068 4Z6KQ.exe 1672 2V2RO.exe 1672 2V2RO.exe 1600 92AC9.exe 1600 92AC9.exe 1808 18DYT.exe 1808 18DYT.exe 2544 553PI.exe 2544 553PI.exe 2588 GR7W1.exe 2588 GR7W1.exe 2212 H9504.exe 2212 H9504.exe 2584 AN0NI.exe 2584 AN0NI.exe 2024 X3I1U.exe 2024 X3I1U.exe 2780 N9094.exe 2780 N9094.exe 3052 4055K.exe 3052 4055K.exe 1820 9QYOI.exe 1820 9QYOI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 836 wrote to memory of 2320 836 09d4641332335177ea776f747a31a35e2e16ea585d3335bd7484c27c732dd6e1.exe 28 PID 836 wrote to memory of 2320 836 09d4641332335177ea776f747a31a35e2e16ea585d3335bd7484c27c732dd6e1.exe 28 PID 836 wrote to memory of 2320 836 09d4641332335177ea776f747a31a35e2e16ea585d3335bd7484c27c732dd6e1.exe 28 PID 836 wrote to memory of 2320 836 09d4641332335177ea776f747a31a35e2e16ea585d3335bd7484c27c732dd6e1.exe 28 PID 2320 wrote to memory of 1468 2320 7MGWH.exe 29 PID 2320 wrote to memory of 1468 2320 7MGWH.exe 29 PID 2320 wrote to memory of 1468 2320 7MGWH.exe 29 PID 2320 wrote to memory of 1468 2320 7MGWH.exe 29 PID 1468 wrote to memory of 2668 1468 XU8MR.exe 30 PID 1468 wrote to memory of 2668 1468 XU8MR.exe 30 PID 1468 wrote to memory of 2668 1468 XU8MR.exe 30 PID 1468 wrote to memory of 2668 1468 XU8MR.exe 30 PID 2668 wrote to memory of 2304 2668 EI097.exe 31 PID 2668 wrote to memory of 2304 2668 EI097.exe 31 PID 2668 wrote to memory of 2304 2668 EI097.exe 31 PID 2668 wrote to memory of 2304 2668 EI097.exe 31 PID 2304 wrote to memory of 2704 2304 GD5R5.exe 32 PID 2304 wrote to memory of 2704 2304 GD5R5.exe 32 PID 2304 wrote to memory of 2704 2304 GD5R5.exe 32 PID 2304 wrote to memory of 2704 2304 GD5R5.exe 32 PID 2704 wrote to memory of 2904 2704 5KA12.exe 33 PID 2704 wrote to memory of 2904 2704 5KA12.exe 33 PID 2704 wrote to memory of 2904 2704 5KA12.exe 33 PID 2704 wrote to memory of 2904 2704 5KA12.exe 33 PID 2904 wrote to memory of 1588 2904 X8A91.exe 34 PID 2904 wrote to memory of 1588 2904 X8A91.exe 34 PID 2904 wrote to memory of 1588 2904 X8A91.exe 34 PID 2904 wrote to memory of 1588 2904 X8A91.exe 34 PID 1588 wrote to memory of 1692 1588 054BW.exe 35 PID 1588 wrote to memory of 1692 1588 054BW.exe 35 PID 1588 wrote to memory of 1692 1588 054BW.exe 35 PID 1588 wrote to memory of 1692 1588 054BW.exe 35 PID 1692 wrote to memory of 1992 1692 M56QG.exe 36 PID 1692 wrote to memory of 1992 1692 M56QG.exe 36 PID 1692 wrote to memory of 1992 1692 M56QG.exe 36 PID 1692 wrote to memory of 1992 1692 M56QG.exe 36 PID 1992 wrote to memory of 2108 1992 T9Y28.exe 37 PID 1992 wrote to memory of 2108 1992 T9Y28.exe 37 PID 1992 wrote to memory of 2108 1992 T9Y28.exe 37 PID 1992 wrote to memory of 2108 1992 T9Y28.exe 37 PID 2108 wrote to memory of 1772 2108 B6G24.exe 38 PID 2108 wrote to memory of 1772 2108 B6G24.exe 38 PID 2108 wrote to memory of 1772 2108 B6G24.exe 38 PID 2108 wrote to memory of 1772 2108 B6G24.exe 38 PID 1772 wrote to memory of 2296 1772 9LS3B.exe 39 PID 1772 wrote to memory of 2296 1772 9LS3B.exe 39 PID 1772 wrote to memory of 2296 1772 9LS3B.exe 39 PID 1772 wrote to memory of 2296 1772 9LS3B.exe 39 PID 2296 wrote to memory of 384 2296 20H85.exe 40 PID 2296 wrote to memory of 384 2296 20H85.exe 40 PID 2296 wrote to memory of 384 2296 20H85.exe 40 PID 2296 wrote to memory of 384 2296 20H85.exe 40 PID 384 wrote to memory of 1444 384 K02X2.exe 41 PID 384 wrote to memory of 1444 384 K02X2.exe 41 PID 384 wrote to memory of 1444 384 K02X2.exe 41 PID 384 wrote to memory of 1444 384 K02X2.exe 41 PID 1444 wrote to memory of 2224 1444 DK006.exe 42 PID 1444 wrote to memory of 2224 1444 DK006.exe 42 PID 1444 wrote to memory of 2224 1444 DK006.exe 42 PID 1444 wrote to memory of 2224 1444 DK006.exe 42 PID 2224 wrote to memory of 2084 2224 KGZRV.exe 43 PID 2224 wrote to memory of 2084 2224 KGZRV.exe 43 PID 2224 wrote to memory of 2084 2224 KGZRV.exe 43 PID 2224 wrote to memory of 2084 2224 KGZRV.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\09d4641332335177ea776f747a31a35e2e16ea585d3335bd7484c27c732dd6e1.exe"C:\Users\Admin\AppData\Local\Temp\09d4641332335177ea776f747a31a35e2e16ea585d3335bd7484c27c732dd6e1.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Local\Temp\7MGWH.exe"C:\Users\Admin\AppData\Local\Temp\7MGWH.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\XU8MR.exe"C:\Users\Admin\AppData\Local\Temp\XU8MR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\EI097.exe"C:\Users\Admin\AppData\Local\Temp\EI097.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\GD5R5.exe"C:\Users\Admin\AppData\Local\Temp\GD5R5.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\5KA12.exe"C:\Users\Admin\AppData\Local\Temp\5KA12.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\X8A91.exe"C:\Users\Admin\AppData\Local\Temp\X8A91.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\054BW.exe"C:\Users\Admin\AppData\Local\Temp\054BW.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\M56QG.exe"C:\Users\Admin\AppData\Local\Temp\M56QG.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\T9Y28.exe"C:\Users\Admin\AppData\Local\Temp\T9Y28.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\B6G24.exe"C:\Users\Admin\AppData\Local\Temp\B6G24.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\9LS3B.exe"C:\Users\Admin\AppData\Local\Temp\9LS3B.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\20H85.exe"C:\Users\Admin\AppData\Local\Temp\20H85.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\K02X2.exe"C:\Users\Admin\AppData\Local\Temp\K02X2.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:384 -
C:\Users\Admin\AppData\Local\Temp\DK006.exe"C:\Users\Admin\AppData\Local\Temp\DK006.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\KGZRV.exe"C:\Users\Admin\AppData\Local\Temp\KGZRV.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\6895O.exe"C:\Users\Admin\AppData\Local\Temp\6895O.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\L01L1.exe"C:\Users\Admin\AppData\Local\Temp\L01L1.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\4R8M7.exe"C:\Users\Admin\AppData\Local\Temp\4R8M7.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\I6NJ9.exe"C:\Users\Admin\AppData\Local\Temp\I6NJ9.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\4Z6KQ.exe"C:\Users\Admin\AppData\Local\Temp\4Z6KQ.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\2V2RO.exe"C:\Users\Admin\AppData\Local\Temp\2V2RO.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\92AC9.exe"C:\Users\Admin\AppData\Local\Temp\92AC9.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\18DYT.exe"C:\Users\Admin\AppData\Local\Temp\18DYT.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\553PI.exe"C:\Users\Admin\AppData\Local\Temp\553PI.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\GR7W1.exe"C:\Users\Admin\AppData\Local\Temp\GR7W1.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\H9504.exe"C:\Users\Admin\AppData\Local\Temp\H9504.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\AN0NI.exe"C:\Users\Admin\AppData\Local\Temp\AN0NI.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\X3I1U.exe"C:\Users\Admin\AppData\Local\Temp\X3I1U.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\N9094.exe"C:\Users\Admin\AppData\Local\Temp\N9094.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\4055K.exe"C:\Users\Admin\AppData\Local\Temp\4055K.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\9QYOI.exe"C:\Users\Admin\AppData\Local\Temp\9QYOI.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\OI6A6.exe"C:\Users\Admin\AppData\Local\Temp\OI6A6.exe"33⤵
- Executes dropped EXE
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\Y89ZE.exe"C:\Users\Admin\AppData\Local\Temp\Y89ZE.exe"34⤵
- Executes dropped EXE
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\5YKTC.exe"C:\Users\Admin\AppData\Local\Temp\5YKTC.exe"35⤵
- Executes dropped EXE
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\175T7.exe"C:\Users\Admin\AppData\Local\Temp\175T7.exe"36⤵
- Executes dropped EXE
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\05M2U.exe"C:\Users\Admin\AppData\Local\Temp\05M2U.exe"37⤵
- Executes dropped EXE
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\0QJX3.exe"C:\Users\Admin\AppData\Local\Temp\0QJX3.exe"38⤵
- Executes dropped EXE
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\70LBS.exe"C:\Users\Admin\AppData\Local\Temp\70LBS.exe"39⤵
- Executes dropped EXE
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\3V9N4.exe"C:\Users\Admin\AppData\Local\Temp\3V9N4.exe"40⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\H3Z1O.exe"C:\Users\Admin\AppData\Local\Temp\H3Z1O.exe"41⤵
- Executes dropped EXE
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\5570O.exe"C:\Users\Admin\AppData\Local\Temp\5570O.exe"42⤵
- Executes dropped EXE
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\87566.exe"C:\Users\Admin\AppData\Local\Temp\87566.exe"43⤵
- Executes dropped EXE
PID:560 -
C:\Users\Admin\AppData\Local\Temp\U79RS.exe"C:\Users\Admin\AppData\Local\Temp\U79RS.exe"44⤵
- Executes dropped EXE
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\FE6V1.exe"C:\Users\Admin\AppData\Local\Temp\FE6V1.exe"45⤵
- Executes dropped EXE
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\LRO73.exe"C:\Users\Admin\AppData\Local\Temp\LRO73.exe"46⤵
- Executes dropped EXE
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\67I3D.exe"C:\Users\Admin\AppData\Local\Temp\67I3D.exe"47⤵
- Executes dropped EXE
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\PC6TK.exe"C:\Users\Admin\AppData\Local\Temp\PC6TK.exe"48⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\1H7W7.exe"C:\Users\Admin\AppData\Local\Temp\1H7W7.exe"49⤵
- Executes dropped EXE
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\8IG40.exe"C:\Users\Admin\AppData\Local\Temp\8IG40.exe"50⤵
- Executes dropped EXE
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\9W7K6.exe"C:\Users\Admin\AppData\Local\Temp\9W7K6.exe"51⤵
- Executes dropped EXE
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\J99K8.exe"C:\Users\Admin\AppData\Local\Temp\J99K8.exe"52⤵
- Executes dropped EXE
PID:888 -
C:\Users\Admin\AppData\Local\Temp\N501I.exe"C:\Users\Admin\AppData\Local\Temp\N501I.exe"53⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\5F3SY.exe"C:\Users\Admin\AppData\Local\Temp\5F3SY.exe"54⤵
- Executes dropped EXE
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\Z3ID1.exe"C:\Users\Admin\AppData\Local\Temp\Z3ID1.exe"55⤵
- Executes dropped EXE
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Z3053.exe"C:\Users\Admin\AppData\Local\Temp\Z3053.exe"56⤵
- Executes dropped EXE
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\7GYED.exe"C:\Users\Admin\AppData\Local\Temp\7GYED.exe"57⤵
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\71UW0.exe"C:\Users\Admin\AppData\Local\Temp\71UW0.exe"58⤵
- Executes dropped EXE
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\GC3YG.exe"C:\Users\Admin\AppData\Local\Temp\GC3YG.exe"59⤵
- Executes dropped EXE
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\8737Q.exe"C:\Users\Admin\AppData\Local\Temp\8737Q.exe"60⤵
- Executes dropped EXE
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\S9337.exe"C:\Users\Admin\AppData\Local\Temp\S9337.exe"61⤵
- Executes dropped EXE
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\YLZ1L.exe"C:\Users\Admin\AppData\Local\Temp\YLZ1L.exe"62⤵
- Executes dropped EXE
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\8Y6H0.exe"C:\Users\Admin\AppData\Local\Temp\8Y6H0.exe"63⤵
- Executes dropped EXE
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\1FNZP.exe"C:\Users\Admin\AppData\Local\Temp\1FNZP.exe"64⤵
- Executes dropped EXE
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\M165Z.exe"C:\Users\Admin\AppData\Local\Temp\M165Z.exe"65⤵
- Executes dropped EXE
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\WO814.exe"C:\Users\Admin\AppData\Local\Temp\WO814.exe"66⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\99X9O.exe"C:\Users\Admin\AppData\Local\Temp\99X9O.exe"67⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\0P89H.exe"C:\Users\Admin\AppData\Local\Temp\0P89H.exe"68⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\DDKF1.exe"C:\Users\Admin\AppData\Local\Temp\DDKF1.exe"69⤵PID:2748
-
C:\Users\Admin\AppData\Local\Temp\129YU.exe"C:\Users\Admin\AppData\Local\Temp\129YU.exe"70⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\Y14R4.exe"C:\Users\Admin\AppData\Local\Temp\Y14R4.exe"71⤵PID:2336
-
C:\Users\Admin\AppData\Local\Temp\CK708.exe"C:\Users\Admin\AppData\Local\Temp\CK708.exe"72⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\HS167.exe"C:\Users\Admin\AppData\Local\Temp\HS167.exe"73⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\8VC1Q.exe"C:\Users\Admin\AppData\Local\Temp\8VC1Q.exe"74⤵PID:1832
-
C:\Users\Admin\AppData\Local\Temp\2U6L3.exe"C:\Users\Admin\AppData\Local\Temp\2U6L3.exe"75⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\OGXWC.exe"C:\Users\Admin\AppData\Local\Temp\OGXWC.exe"76⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\9Z15K.exe"C:\Users\Admin\AppData\Local\Temp\9Z15K.exe"77⤵PID:2832
-
C:\Users\Admin\AppData\Local\Temp\3J49K.exe"C:\Users\Admin\AppData\Local\Temp\3J49K.exe"78⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\4XBM9.exe"C:\Users\Admin\AppData\Local\Temp\4XBM9.exe"79⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\I65F4.exe"C:\Users\Admin\AppData\Local\Temp\I65F4.exe"80⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\703XI.exe"C:\Users\Admin\AppData\Local\Temp\703XI.exe"81⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\5P326.exe"C:\Users\Admin\AppData\Local\Temp\5P326.exe"82⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\Z9184.exe"C:\Users\Admin\AppData\Local\Temp\Z9184.exe"83⤵PID:2920
-
C:\Users\Admin\AppData\Local\Temp\9194V.exe"C:\Users\Admin\AppData\Local\Temp\9194V.exe"84⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\SN9E6.exe"C:\Users\Admin\AppData\Local\Temp\SN9E6.exe"85⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\09NXV.exe"C:\Users\Admin\AppData\Local\Temp\09NXV.exe"86⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\25CO5.exe"C:\Users\Admin\AppData\Local\Temp\25CO5.exe"87⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\MP0I7.exe"C:\Users\Admin\AppData\Local\Temp\MP0I7.exe"88⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\0XX5D.exe"C:\Users\Admin\AppData\Local\Temp\0XX5D.exe"89⤵PID:2680
-
C:\Users\Admin\AppData\Local\Temp\G1824.exe"C:\Users\Admin\AppData\Local\Temp\G1824.exe"90⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\14HYE.exe"C:\Users\Admin\AppData\Local\Temp\14HYE.exe"91⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\1G6YJ.exe"C:\Users\Admin\AppData\Local\Temp\1G6YJ.exe"92⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\HM4I6.exe"C:\Users\Admin\AppData\Local\Temp\HM4I6.exe"93⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\4TZSM.exe"C:\Users\Admin\AppData\Local\Temp\4TZSM.exe"94⤵PID:1824
-
C:\Users\Admin\AppData\Local\Temp\3H2K6.exe"C:\Users\Admin\AppData\Local\Temp\3H2K6.exe"95⤵PID:3052
-
C:\Users\Admin\AppData\Local\Temp\X3MD1.exe"C:\Users\Admin\AppData\Local\Temp\X3MD1.exe"96⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\R925A.exe"C:\Users\Admin\AppData\Local\Temp\R925A.exe"97⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\QOO13.exe"C:\Users\Admin\AppData\Local\Temp\QOO13.exe"98⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\XCH7J.exe"C:\Users\Admin\AppData\Local\Temp\XCH7J.exe"99⤵PID:1524
-
C:\Users\Admin\AppData\Local\Temp\U4138.exe"C:\Users\Admin\AppData\Local\Temp\U4138.exe"100⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\S1KD8.exe"C:\Users\Admin\AppData\Local\Temp\S1KD8.exe"101⤵PID:2888
-
C:\Users\Admin\AppData\Local\Temp\7F9FA.exe"C:\Users\Admin\AppData\Local\Temp\7F9FA.exe"102⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\VM7Q0.exe"C:\Users\Admin\AppData\Local\Temp\VM7Q0.exe"103⤵PID:472
-
C:\Users\Admin\AppData\Local\Temp\U9YQP.exe"C:\Users\Admin\AppData\Local\Temp\U9YQP.exe"104⤵PID:1172
-
C:\Users\Admin\AppData\Local\Temp\W8414.exe"C:\Users\Admin\AppData\Local\Temp\W8414.exe"105⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\K5I25.exe"C:\Users\Admin\AppData\Local\Temp\K5I25.exe"106⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\3G5NX.exe"C:\Users\Admin\AppData\Local\Temp\3G5NX.exe"107⤵PID:448
-
C:\Users\Admin\AppData\Local\Temp\364OC.exe"C:\Users\Admin\AppData\Local\Temp\364OC.exe"108⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\LC6I8.exe"C:\Users\Admin\AppData\Local\Temp\LC6I8.exe"109⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\507IF.exe"C:\Users\Admin\AppData\Local\Temp\507IF.exe"110⤵PID:984
-
C:\Users\Admin\AppData\Local\Temp\G3G95.exe"C:\Users\Admin\AppData\Local\Temp\G3G95.exe"111⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\DD578.exe"C:\Users\Admin\AppData\Local\Temp\DD578.exe"112⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\0133I.exe"C:\Users\Admin\AppData\Local\Temp\0133I.exe"113⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\K1PUR.exe"C:\Users\Admin\AppData\Local\Temp\K1PUR.exe"114⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\FH469.exe"C:\Users\Admin\AppData\Local\Temp\FH469.exe"115⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\5PAJ8.exe"C:\Users\Admin\AppData\Local\Temp\5PAJ8.exe"116⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\2X83G.exe"C:\Users\Admin\AppData\Local\Temp\2X83G.exe"117⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\B4V1W.exe"C:\Users\Admin\AppData\Local\Temp\B4V1W.exe"118⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\7C5J3.exe"C:\Users\Admin\AppData\Local\Temp\7C5J3.exe"119⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\W2XKP.exe"C:\Users\Admin\AppData\Local\Temp\W2XKP.exe"120⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\3MOV5.exe"C:\Users\Admin\AppData\Local\Temp\3MOV5.exe"121⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\W4W4U.exe"C:\Users\Admin\AppData\Local\Temp\W4W4U.exe"122⤵PID:2828
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-