Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
138s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240611-en -
resource tags
arch:x64arch:x86image:win7-20240611-enlocale:en-usos:windows7-x64system -
submitted
28/06/2024, 12:09
Static task
static1
Behavioral task
behavioral1
Sample
1a0f363e69c03fe992e6a28cf4823815_JaffaCakes118.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
1a0f363e69c03fe992e6a28cf4823815_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
1a0f363e69c03fe992e6a28cf4823815_JaffaCakes118.exe
-
Size
168KB
-
MD5
1a0f363e69c03fe992e6a28cf4823815
-
SHA1
4a6aa3f65685d4b4f896288f8a96047e6ae3166b
-
SHA256
dc270d82b4639c4783ab2469e8428cfb979921035502d6ee3002f0d839d82c6c
-
SHA512
e3adf529db0c04d6b73d95efa4451f7ac36387615c388039520989b2969edde740797490f14481015a96ff11ac0ff435de4bdf59a54336fea21acc110ae2f2e0
-
SSDEEP
3072:gLuC9XN6Q22l61bgI3fZD5uA9vfB0q1wdNp9Txfs5Bw0/Cq:M9d6Qdl8ffv4fp9T0BzN
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2672 wuauolts.exe 2700 wuauolts.exe 2644 wuauolts.exe 2624 wuauolts.exe 2728 wuauolts.exe 2668 wuauolts.exe 2656 wuauolts.exe 2708 wuauolts.exe 2536 wuauolts.exe 2196 wuauolts.exe 264 wuauolts.exe 1428 wuauolts.exe 1528 wuauolts.exe 2876 wuauolts.exe 2932 wuauolts.exe 2788 wuauolts.exe 1712 wuauolts.exe 2552 wuauolts.exe 1992 wuauolts.exe 824 wuauolts.exe 2864 wuauolts.exe 1544 wuauolts.exe 2588 wuauolts.exe 1532 wuauolts.exe 2180 wuauolts.exe 1776 wuauolts.exe 2084 wuauolts.exe 2968 wuauolts.exe 2976 wuauolts.exe 2276 wuauolts.exe 2092 wuauolts.exe 1932 wuauolts.exe 1068 wuauolts.exe 2468 wuauolts.exe 2380 wuauolts.exe 1108 wuauolts.exe 2480 wuauolts.exe 1188 wuauolts.exe 1848 wuauolts.exe 1172 wuauolts.exe 856 wuauolts.exe 2408 wuauolts.exe 1820 wuauolts.exe 2880 wuauolts.exe 684 wuauolts.exe 1432 wuauolts.exe 2328 wuauolts.exe 784 wuauolts.exe 2264 wuauolts.exe 1088 wuauolts.exe 2024 wuauolts.exe 1772 wuauolts.exe 1920 wuauolts.exe 2780 wuauolts.exe 1620 wuauolts.exe 2124 wuauolts.exe 2152 wuauolts.exe 2704 wuauolts.exe 2692 wuauolts.exe 2636 wuauolts.exe 1800 wuauolts.exe 2660 wuauolts.exe 1900 wuauolts.exe 3040 wuauolts.exe -
Loads dropped DLL 64 IoCs
pid Process 1968 1a0f363e69c03fe992e6a28cf4823815_JaffaCakes118.exe 1968 1a0f363e69c03fe992e6a28cf4823815_JaffaCakes118.exe 2672 wuauolts.exe 2672 wuauolts.exe 2700 wuauolts.exe 2700 wuauolts.exe 2644 wuauolts.exe 2644 wuauolts.exe 2624 wuauolts.exe 2624 wuauolts.exe 2728 wuauolts.exe 2728 wuauolts.exe 2668 wuauolts.exe 2668 wuauolts.exe 2656 wuauolts.exe 2656 wuauolts.exe 2708 wuauolts.exe 2708 wuauolts.exe 2536 wuauolts.exe 2536 wuauolts.exe 2196 wuauolts.exe 2196 wuauolts.exe 264 wuauolts.exe 264 wuauolts.exe 1428 wuauolts.exe 1428 wuauolts.exe 1528 wuauolts.exe 1528 wuauolts.exe 2876 wuauolts.exe 2876 wuauolts.exe 2932 wuauolts.exe 2932 wuauolts.exe 2788 wuauolts.exe 2788 wuauolts.exe 1712 wuauolts.exe 1712 wuauolts.exe 2552 wuauolts.exe 2552 wuauolts.exe 1992 wuauolts.exe 1992 wuauolts.exe 824 wuauolts.exe 824 wuauolts.exe 2864 wuauolts.exe 2864 wuauolts.exe 1544 wuauolts.exe 1544 wuauolts.exe 2588 wuauolts.exe 2588 wuauolts.exe 1532 wuauolts.exe 1532 wuauolts.exe 2180 wuauolts.exe 2180 wuauolts.exe 1776 wuauolts.exe 1776 wuauolts.exe 2084 wuauolts.exe 2084 wuauolts.exe 2968 wuauolts.exe 2968 wuauolts.exe 2976 wuauolts.exe 2976 wuauolts.exe 2276 wuauolts.exe 2276 wuauolts.exe 2092 wuauolts.exe 2092 wuauolts.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\j: wuauolts.exe File opened (read-only) \??\k: wuauolts.exe File opened (read-only) \??\u: Process not Found File opened (read-only) \??\g: Process not Found File opened (read-only) \??\z: wuauolts.exe File opened (read-only) \??\n: wuauolts.exe File opened (read-only) \??\i: wuauolts.exe File opened (read-only) \??\p: wuauolts.exe File opened (read-only) \??\v: wuauolts.exe File opened (read-only) \??\u: Process not Found File opened (read-only) \??\o: Process not Found File opened (read-only) \??\m: wuauolts.exe File opened (read-only) \??\k: wuauolts.exe File opened (read-only) \??\l: wuauolts.exe File opened (read-only) \??\k: wuauolts.exe File opened (read-only) \??\i: wuauolts.exe File opened (read-only) \??\p: Process not Found File opened (read-only) \??\p: Process not Found File opened (read-only) \??\s: wuauolts.exe File opened (read-only) \??\e: wuauolts.exe File opened (read-only) \??\r: wuauolts.exe File opened (read-only) \??\l: Process not Found File opened (read-only) \??\v: wuauolts.exe File opened (read-only) \??\s: wuauolts.exe File opened (read-only) \??\i: wuauolts.exe File opened (read-only) \??\t: Process not Found File opened (read-only) \??\n: wuauolts.exe File opened (read-only) \??\z: wuauolts.exe File opened (read-only) \??\q: wuauolts.exe File opened (read-only) \??\r: Process not Found File opened (read-only) \??\n: wuauolts.exe File opened (read-only) \??\m: Process not Found File opened (read-only) \??\s: Process not Found File opened (read-only) \??\z: wuauolts.exe File opened (read-only) \??\t: wuauolts.exe File opened (read-only) \??\s: wuauolts.exe File opened (read-only) \??\o: wuauolts.exe File opened (read-only) \??\o: wuauolts.exe File opened (read-only) \??\w: wuauolts.exe File opened (read-only) \??\e: Process not Found File opened (read-only) \??\h: wuauolts.exe File opened (read-only) \??\j: wuauolts.exe File opened (read-only) \??\o: wuauolts.exe File opened (read-only) \??\j: Process not Found File opened (read-only) \??\y: Process not Found File opened (read-only) \??\o: Process not Found File opened (read-only) \??\n: wuauolts.exe File opened (read-only) \??\l: wuauolts.exe File opened (read-only) \??\q: Process not Found File opened (read-only) \??\m: Process not Found File opened (read-only) \??\h: Process not Found File opened (read-only) \??\j: wuauolts.exe File opened (read-only) \??\k: wuauolts.exe File opened (read-only) \??\h: Process not Found File opened (read-only) \??\e: wuauolts.exe File opened (read-only) \??\i: wuauolts.exe File opened (read-only) \??\o: wuauolts.exe File opened (read-only) \??\v: wuauolts.exe File opened (read-only) \??\s: Process not Found File opened (read-only) \??\t: wuauolts.exe File opened (read-only) \??\y: wuauolts.exe File opened (read-only) \??\y: wuauolts.exe File opened (read-only) \??\k: wuauolts.exe File opened (read-only) \??\w: wuauolts.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe Process not Found File created C:\Windows\SysWOW64\wuauolts.exe Process not Found File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe Process not Found File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe Process not Found File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe Process not Found File created C:\Windows\SysWOW64\wuauolts.exe Process not Found File created C:\Windows\SysWOW64\wuauolts.exe Process not Found File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe Process not Found File created C:\Windows\SysWOW64\wuauolts.exe Process not Found File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe Process not Found File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe Process not Found File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe Process not Found File created C:\Windows\SysWOW64\wuauolts.exe Process not Found File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe File created C:\Windows\SysWOW64\wuauolts.exe wuauolts.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
pid Process 1968 1a0f363e69c03fe992e6a28cf4823815_JaffaCakes118.exe 2672 wuauolts.exe 2700 wuauolts.exe 2644 wuauolts.exe 2624 wuauolts.exe 2728 wuauolts.exe 2668 wuauolts.exe 2656 wuauolts.exe 2708 wuauolts.exe 2536 wuauolts.exe 2196 wuauolts.exe 264 wuauolts.exe 1428 wuauolts.exe 1528 wuauolts.exe 2876 wuauolts.exe 2932 wuauolts.exe 2788 wuauolts.exe 1712 wuauolts.exe 2552 wuauolts.exe 1992 wuauolts.exe 824 wuauolts.exe 2864 wuauolts.exe 1544 wuauolts.exe 2588 wuauolts.exe 1532 wuauolts.exe 2180 wuauolts.exe 1776 wuauolts.exe 2084 wuauolts.exe 2968 wuauolts.exe 2976 wuauolts.exe 2276 wuauolts.exe 2092 wuauolts.exe 1932 wuauolts.exe 1068 wuauolts.exe 2468 wuauolts.exe 2380 wuauolts.exe 1108 wuauolts.exe 2480 wuauolts.exe 1188 wuauolts.exe 1848 wuauolts.exe 1172 wuauolts.exe 856 wuauolts.exe 2408 wuauolts.exe 1820 wuauolts.exe 2880 wuauolts.exe 684 wuauolts.exe 1432 wuauolts.exe 2328 wuauolts.exe 784 wuauolts.exe 2264 wuauolts.exe 1088 wuauolts.exe 2024 wuauolts.exe 1772 wuauolts.exe 1920 wuauolts.exe 2780 wuauolts.exe 1620 wuauolts.exe 2124 wuauolts.exe 2152 wuauolts.exe 2704 wuauolts.exe 2692 wuauolts.exe 2636 wuauolts.exe 1800 wuauolts.exe 2660 wuauolts.exe 1900 wuauolts.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2672 1968 1a0f363e69c03fe992e6a28cf4823815_JaffaCakes118.exe 28 PID 1968 wrote to memory of 2672 1968 1a0f363e69c03fe992e6a28cf4823815_JaffaCakes118.exe 28 PID 1968 wrote to memory of 2672 1968 1a0f363e69c03fe992e6a28cf4823815_JaffaCakes118.exe 28 PID 1968 wrote to memory of 2672 1968 1a0f363e69c03fe992e6a28cf4823815_JaffaCakes118.exe 28 PID 2672 wrote to memory of 2700 2672 wuauolts.exe 29 PID 2672 wrote to memory of 2700 2672 wuauolts.exe 29 PID 2672 wrote to memory of 2700 2672 wuauolts.exe 29 PID 2672 wrote to memory of 2700 2672 wuauolts.exe 29 PID 2700 wrote to memory of 2644 2700 wuauolts.exe 30 PID 2700 wrote to memory of 2644 2700 wuauolts.exe 30 PID 2700 wrote to memory of 2644 2700 wuauolts.exe 30 PID 2700 wrote to memory of 2644 2700 wuauolts.exe 30 PID 2644 wrote to memory of 2624 2644 wuauolts.exe 31 PID 2644 wrote to memory of 2624 2644 wuauolts.exe 31 PID 2644 wrote to memory of 2624 2644 wuauolts.exe 31 PID 2644 wrote to memory of 2624 2644 wuauolts.exe 31 PID 2624 wrote to memory of 2728 2624 wuauolts.exe 32 PID 2624 wrote to memory of 2728 2624 wuauolts.exe 32 PID 2624 wrote to memory of 2728 2624 wuauolts.exe 32 PID 2624 wrote to memory of 2728 2624 wuauolts.exe 32 PID 2728 wrote to memory of 2668 2728 wuauolts.exe 33 PID 2728 wrote to memory of 2668 2728 wuauolts.exe 33 PID 2728 wrote to memory of 2668 2728 wuauolts.exe 33 PID 2728 wrote to memory of 2668 2728 wuauolts.exe 33 PID 2668 wrote to memory of 2656 2668 wuauolts.exe 34 PID 2668 wrote to memory of 2656 2668 wuauolts.exe 34 PID 2668 wrote to memory of 2656 2668 wuauolts.exe 34 PID 2668 wrote to memory of 2656 2668 wuauolts.exe 34 PID 2656 wrote to memory of 2708 2656 wuauolts.exe 35 PID 2656 wrote to memory of 2708 2656 wuauolts.exe 35 PID 2656 wrote to memory of 2708 2656 wuauolts.exe 35 PID 2656 wrote to memory of 2708 2656 wuauolts.exe 35 PID 2708 wrote to memory of 2536 2708 wuauolts.exe 36 PID 2708 wrote to memory of 2536 2708 wuauolts.exe 36 PID 2708 wrote to memory of 2536 2708 wuauolts.exe 36 PID 2708 wrote to memory of 2536 2708 wuauolts.exe 36 PID 2536 wrote to memory of 2196 2536 wuauolts.exe 37 PID 2536 wrote to memory of 2196 2536 wuauolts.exe 37 PID 2536 wrote to memory of 2196 2536 wuauolts.exe 37 PID 2536 wrote to memory of 2196 2536 wuauolts.exe 37 PID 2196 wrote to memory of 264 2196 wuauolts.exe 38 PID 2196 wrote to memory of 264 2196 wuauolts.exe 38 PID 2196 wrote to memory of 264 2196 wuauolts.exe 38 PID 2196 wrote to memory of 264 2196 wuauolts.exe 38 PID 264 wrote to memory of 1428 264 wuauolts.exe 39 PID 264 wrote to memory of 1428 264 wuauolts.exe 39 PID 264 wrote to memory of 1428 264 wuauolts.exe 39 PID 264 wrote to memory of 1428 264 wuauolts.exe 39 PID 1428 wrote to memory of 1528 1428 wuauolts.exe 40 PID 1428 wrote to memory of 1528 1428 wuauolts.exe 40 PID 1428 wrote to memory of 1528 1428 wuauolts.exe 40 PID 1428 wrote to memory of 1528 1428 wuauolts.exe 40 PID 1528 wrote to memory of 2876 1528 wuauolts.exe 41 PID 1528 wrote to memory of 2876 1528 wuauolts.exe 41 PID 1528 wrote to memory of 2876 1528 wuauolts.exe 41 PID 1528 wrote to memory of 2876 1528 wuauolts.exe 41 PID 2876 wrote to memory of 2932 2876 wuauolts.exe 42 PID 2876 wrote to memory of 2932 2876 wuauolts.exe 42 PID 2876 wrote to memory of 2932 2876 wuauolts.exe 42 PID 2876 wrote to memory of 2932 2876 wuauolts.exe 42 PID 2932 wrote to memory of 2788 2932 wuauolts.exe 43 PID 2932 wrote to memory of 2788 2932 wuauolts.exe 43 PID 2932 wrote to memory of 2788 2932 wuauolts.exe 43 PID 2932 wrote to memory of 2788 2932 wuauolts.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a0f363e69c03fe992e6a28cf4823815_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1a0f363e69c03fe992e6a28cf4823815_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2196 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1428 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:1528 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2788 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1712 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2552 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1992 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:824 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2864 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1544 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2588 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1532 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2180 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1776 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2084 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2968 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2976 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2276 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2092 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe33⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1932 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe34⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1068 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe35⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2468 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe36⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2380 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe37⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1108 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe38⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2480 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe39⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1188 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe40⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1848 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe41⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1172 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe42⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:856 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe43⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2408 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe44⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1820 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe45⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2880 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:684 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe47⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1432 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe48⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2328 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe49⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:784 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe50⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2264 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe51⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1088 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe52⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2024 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe53⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1772 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe54⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1920 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe55⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2780 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe56⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1620 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe57⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2124 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe58⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2152 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe59⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2704 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe60⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2692 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe61⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2636 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe62⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1800 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe63⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:2660 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe64⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
PID:1900 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe65⤵
- Executes dropped EXE
PID:3040 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe66⤵PID:3036
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe67⤵PID:2240
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe68⤵PID:2224
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe69⤵PID:1148
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe70⤵PID:560
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe71⤵PID:1668
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe72⤵PID:2560
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe73⤵PID:1660
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe74⤵PID:2896
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe75⤵PID:1124
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe76⤵PID:2800
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe77⤵
- Enumerates connected drives
PID:2796 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe78⤵PID:1952
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe79⤵
- Drops file in System32 directory
PID:1656 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe80⤵PID:636
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe81⤵PID:1740
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe82⤵PID:2868
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe83⤵PID:2916
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe84⤵PID:2356
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe85⤵PID:1252
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe86⤵PID:1056
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe87⤵PID:1828
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe88⤵PID:2272
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe89⤵PID:1512
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe90⤵PID:1844
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe91⤵PID:556
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe92⤵PID:2992
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe93⤵PID:2296
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe94⤵PID:2172
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe95⤵
- Enumerates connected drives
PID:3028 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe96⤵PID:1632
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe97⤵PID:2784
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe98⤵PID:2352
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe99⤵PID:796
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe100⤵PID:2268
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe101⤵PID:2768
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe102⤵PID:2776
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe103⤵
- Drops file in System32 directory
PID:2440 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe104⤵PID:2008
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe105⤵PID:2540
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe106⤵PID:1732
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe107⤵PID:2564
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe108⤵PID:1228
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe109⤵PID:688
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe110⤵PID:1676
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe111⤵PID:924
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe112⤵PID:2828
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe113⤵
- Drops file in System32 directory
PID:2808 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe114⤵PID:1948
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe115⤵PID:1784
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe116⤵PID:2068
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe117⤵PID:2900
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe118⤵PID:2140
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe119⤵
- Enumerates connected drives
PID:2148 -
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe120⤵PID:2056
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe121⤵PID:1840
-
C:\Windows\SysWOW64\wuauolts.exeC:\Windows\system32\wuauolts.exe122⤵PID:1684
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-