Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
47s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 19:16
Static task
static1
Behavioral task
behavioral1
Sample
195a658cde9567f1e8595fe90989e788097c22366d725cc1481aaf825d47bf15.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
195a658cde9567f1e8595fe90989e788097c22366d725cc1481aaf825d47bf15.exe
Resource
win10v2004-20240508-en
General
-
Target
195a658cde9567f1e8595fe90989e788097c22366d725cc1481aaf825d47bf15.exe
-
Size
232KB
-
MD5
5f341cb119671c972be174ffee9136fc
-
SHA1
1ccf5ea092cf9d291b1e16f938064918d4907717
-
SHA256
195a658cde9567f1e8595fe90989e788097c22366d725cc1481aaf825d47bf15
-
SHA512
8de45ea835a84b491994dbd35a2b87d1c0675b3b171e3afd0e7931500bda88e364d4f6757392f4b4208b60eddbf5d4e8de97dacd84383bdc35e12402270fb70a
-
SSDEEP
3072:GWoKZLeDn4pI+oEhCjG8G3GbGVGBGfGuGxGWYcrf6KadE:GWFZLs4FoEAYcD6Kad
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 54 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation wuqil.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ybvoif.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation naeezup.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation mauug.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation vauuq.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation feodi.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation daiice.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation maeezup.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation fauuq.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation mioruw.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation mauuje.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation vplos.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation qdzuas.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation lauuh.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation shzin.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation 195a658cde9567f1e8595fe90989e788097c22366d725cc1481aaf825d47bf15.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation saooxub.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation mauub.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation diaguu.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation vauuq.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation vplos.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation feodi.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation koejuuh.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation roemuup.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation chxoim.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation xiuus.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation cgqod.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation mioruw.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation doiixab.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation neoohiz.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation vplos.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation wgxoif.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation xeuus.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation coilu.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation muqiz.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation boidu.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation jokeg.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation bauuye.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation wuabe.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation shzip.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation noidu.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation mauug.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation mauuje.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation chxoim.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation liepuu.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation saoohut.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation ryxon.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation roemuup.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation mioruw.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation daeevo.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation caiiye.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation wuabe.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation puinaaw.exe Key value queried \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000\Control Panel\International\Geo\Nation liuus.exe -
Executes dropped EXE 54 IoCs
pid Process 3352 ybvoif.exe 2288 daeevo.exe 1416 diaguu.exe 2204 roemuup.exe 3236 roemuup.exe 608 feodi.exe 4716 chxoim.exe 872 mioruw.exe 2932 mauug.exe 4940 liepuu.exe 2068 saoohut.exe 1332 daiice.exe 3304 caiiye.exe 3716 wgxoif.exe 976 vauuq.exe 3236 vplos.exe 560 doiixab.exe 3804 naeezup.exe 2112 jokeg.exe 4276 wuqil.exe 3280 shzin.exe 1056 mauuje.exe 4516 mauuje.exe 2104 mioruw.exe 2024 xiuus.exe 3244 feodi.exe 3736 muqiz.exe 2340 bauuye.exe 376 maeezup.exe 1408 wuabe.exe 5040 fauuq.exe 1808 mauug.exe 3376 vplos.exe 2976 cgqod.exe 2932 puinaaw.exe 1544 boidu.exe 404 neoohiz.exe 4860 chxoim.exe 4608 mioruw.exe 3516 xeuus.exe 436 ryxon.exe 5056 vauuq.exe 976 qdzuas.exe 4420 koejuuh.exe 4440 saooxub.exe 968 wuabe.exe 2088 mauub.exe 3656 coilu.exe 3056 shzip.exe 1452 lauuh.exe 3124 liuus.exe 4488 vplos.exe 4848 noidu.exe 1304 rzqip.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 792 195a658cde9567f1e8595fe90989e788097c22366d725cc1481aaf825d47bf15.exe 792 195a658cde9567f1e8595fe90989e788097c22366d725cc1481aaf825d47bf15.exe 3352 ybvoif.exe 3352 ybvoif.exe 2288 daeevo.exe 2288 daeevo.exe 1416 diaguu.exe 1416 diaguu.exe 2204 roemuup.exe 2204 roemuup.exe 3236 roemuup.exe 3236 roemuup.exe 608 feodi.exe 608 feodi.exe 4716 chxoim.exe 4716 chxoim.exe 872 mioruw.exe 872 mioruw.exe 2932 mauug.exe 2932 mauug.exe 4940 liepuu.exe 4940 liepuu.exe 2068 saoohut.exe 2068 saoohut.exe 1332 daiice.exe 1332 daiice.exe 3304 caiiye.exe 3304 caiiye.exe 3716 wgxoif.exe 3716 wgxoif.exe 976 vauuq.exe 976 vauuq.exe 3236 vplos.exe 3236 vplos.exe 560 doiixab.exe 560 doiixab.exe 3804 naeezup.exe 3804 naeezup.exe 2112 jokeg.exe 2112 jokeg.exe 4276 wuqil.exe 4276 wuqil.exe 3280 shzin.exe 3280 shzin.exe 1056 mauuje.exe 1056 mauuje.exe 4516 mauuje.exe 4516 mauuje.exe 2104 mioruw.exe 2104 mioruw.exe 2024 xiuus.exe 2024 xiuus.exe 3244 feodi.exe 3244 feodi.exe 3736 muqiz.exe 3736 muqiz.exe 2340 bauuye.exe 2340 bauuye.exe 376 maeezup.exe 376 maeezup.exe 1408 wuabe.exe 1408 wuabe.exe 5040 fauuq.exe 5040 fauuq.exe -
Suspicious use of SetWindowsHookEx 55 IoCs
pid Process 792 195a658cde9567f1e8595fe90989e788097c22366d725cc1481aaf825d47bf15.exe 3352 ybvoif.exe 2288 daeevo.exe 1416 diaguu.exe 2204 roemuup.exe 3236 roemuup.exe 608 feodi.exe 4716 chxoim.exe 872 mioruw.exe 2932 mauug.exe 4940 liepuu.exe 2068 saoohut.exe 1332 daiice.exe 3304 caiiye.exe 3716 wgxoif.exe 976 vauuq.exe 3236 vplos.exe 560 doiixab.exe 3804 naeezup.exe 2112 jokeg.exe 4276 wuqil.exe 3280 shzin.exe 1056 mauuje.exe 4516 mauuje.exe 2104 mioruw.exe 2024 xiuus.exe 3244 feodi.exe 3736 muqiz.exe 2340 bauuye.exe 376 maeezup.exe 1408 wuabe.exe 5040 fauuq.exe 1808 mauug.exe 3376 vplos.exe 2976 cgqod.exe 2932 puinaaw.exe 1544 boidu.exe 404 neoohiz.exe 4860 chxoim.exe 4608 mioruw.exe 3516 xeuus.exe 436 ryxon.exe 5056 vauuq.exe 976 qdzuas.exe 4420 koejuuh.exe 4440 saooxub.exe 968 wuabe.exe 2088 mauub.exe 3656 coilu.exe 3056 shzip.exe 1452 lauuh.exe 3124 liuus.exe 4488 vplos.exe 4848 noidu.exe 1304 rzqip.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 792 wrote to memory of 3352 792 195a658cde9567f1e8595fe90989e788097c22366d725cc1481aaf825d47bf15.exe 81 PID 792 wrote to memory of 3352 792 195a658cde9567f1e8595fe90989e788097c22366d725cc1481aaf825d47bf15.exe 81 PID 792 wrote to memory of 3352 792 195a658cde9567f1e8595fe90989e788097c22366d725cc1481aaf825d47bf15.exe 81 PID 3352 wrote to memory of 2288 3352 ybvoif.exe 82 PID 3352 wrote to memory of 2288 3352 ybvoif.exe 82 PID 3352 wrote to memory of 2288 3352 ybvoif.exe 82 PID 2288 wrote to memory of 1416 2288 daeevo.exe 83 PID 2288 wrote to memory of 1416 2288 daeevo.exe 83 PID 2288 wrote to memory of 1416 2288 daeevo.exe 83 PID 1416 wrote to memory of 2204 1416 diaguu.exe 84 PID 1416 wrote to memory of 2204 1416 diaguu.exe 84 PID 1416 wrote to memory of 2204 1416 diaguu.exe 84 PID 2204 wrote to memory of 3236 2204 roemuup.exe 85 PID 2204 wrote to memory of 3236 2204 roemuup.exe 85 PID 2204 wrote to memory of 3236 2204 roemuup.exe 85 PID 3236 wrote to memory of 608 3236 roemuup.exe 86 PID 3236 wrote to memory of 608 3236 roemuup.exe 86 PID 3236 wrote to memory of 608 3236 roemuup.exe 86 PID 608 wrote to memory of 4716 608 feodi.exe 87 PID 608 wrote to memory of 4716 608 feodi.exe 87 PID 608 wrote to memory of 4716 608 feodi.exe 87 PID 4716 wrote to memory of 872 4716 chxoim.exe 88 PID 4716 wrote to memory of 872 4716 chxoim.exe 88 PID 4716 wrote to memory of 872 4716 chxoim.exe 88 PID 872 wrote to memory of 2932 872 mioruw.exe 89 PID 872 wrote to memory of 2932 872 mioruw.exe 89 PID 872 wrote to memory of 2932 872 mioruw.exe 89 PID 2932 wrote to memory of 4940 2932 mauug.exe 90 PID 2932 wrote to memory of 4940 2932 mauug.exe 90 PID 2932 wrote to memory of 4940 2932 mauug.exe 90 PID 4940 wrote to memory of 2068 4940 liepuu.exe 93 PID 4940 wrote to memory of 2068 4940 liepuu.exe 93 PID 4940 wrote to memory of 2068 4940 liepuu.exe 93 PID 2068 wrote to memory of 1332 2068 saoohut.exe 94 PID 2068 wrote to memory of 1332 2068 saoohut.exe 94 PID 2068 wrote to memory of 1332 2068 saoohut.exe 94 PID 1332 wrote to memory of 3304 1332 daiice.exe 97 PID 1332 wrote to memory of 3304 1332 daiice.exe 97 PID 1332 wrote to memory of 3304 1332 daiice.exe 97 PID 3304 wrote to memory of 3716 3304 caiiye.exe 99 PID 3304 wrote to memory of 3716 3304 caiiye.exe 99 PID 3304 wrote to memory of 3716 3304 caiiye.exe 99 PID 3716 wrote to memory of 976 3716 wgxoif.exe 101 PID 3716 wrote to memory of 976 3716 wgxoif.exe 101 PID 3716 wrote to memory of 976 3716 wgxoif.exe 101 PID 976 wrote to memory of 3236 976 vauuq.exe 103 PID 976 wrote to memory of 3236 976 vauuq.exe 103 PID 976 wrote to memory of 3236 976 vauuq.exe 103 PID 3236 wrote to memory of 560 3236 vplos.exe 104 PID 3236 wrote to memory of 560 3236 vplos.exe 104 PID 3236 wrote to memory of 560 3236 vplos.exe 104 PID 560 wrote to memory of 3804 560 doiixab.exe 105 PID 560 wrote to memory of 3804 560 doiixab.exe 105 PID 560 wrote to memory of 3804 560 doiixab.exe 105 PID 3804 wrote to memory of 2112 3804 naeezup.exe 106 PID 3804 wrote to memory of 2112 3804 naeezup.exe 106 PID 3804 wrote to memory of 2112 3804 naeezup.exe 106 PID 2112 wrote to memory of 4276 2112 jokeg.exe 107 PID 2112 wrote to memory of 4276 2112 jokeg.exe 107 PID 2112 wrote to memory of 4276 2112 jokeg.exe 107 PID 4276 wrote to memory of 3280 4276 wuqil.exe 108 PID 4276 wrote to memory of 3280 4276 wuqil.exe 108 PID 4276 wrote to memory of 3280 4276 wuqil.exe 108 PID 3280 wrote to memory of 1056 3280 shzin.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\195a658cde9567f1e8595fe90989e788097c22366d725cc1481aaf825d47bf15.exe"C:\Users\Admin\AppData\Local\Temp\195a658cde9567f1e8595fe90989e788097c22366d725cc1481aaf825d47bf15.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:792 -
C:\Users\Admin\ybvoif.exe"C:\Users\Admin\ybvoif.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Users\Admin\daeevo.exe"C:\Users\Admin\daeevo.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\diaguu.exe"C:\Users\Admin\diaguu.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1416 -
C:\Users\Admin\roemuup.exe"C:\Users\Admin\roemuup.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\roemuup.exe"C:\Users\Admin\roemuup.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\feodi.exe"C:\Users\Admin\feodi.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:608 -
C:\Users\Admin\chxoim.exe"C:\Users\Admin\chxoim.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Users\Admin\mioruw.exe"C:\Users\Admin\mioruw.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Users\Admin\mauug.exe"C:\Users\Admin\mauug.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Users\Admin\liepuu.exe"C:\Users\Admin\liepuu.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\saoohut.exe"C:\Users\Admin\saoohut.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\daiice.exe"C:\Users\Admin\daiice.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Users\Admin\caiiye.exe"C:\Users\Admin\caiiye.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Users\Admin\wgxoif.exe"C:\Users\Admin\wgxoif.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\vauuq.exe"C:\Users\Admin\vauuq.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\vplos.exe"C:\Users\Admin\vplos.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Users\Admin\doiixab.exe"C:\Users\Admin\doiixab.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Users\Admin\naeezup.exe"C:\Users\Admin\naeezup.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Users\Admin\jokeg.exe"C:\Users\Admin\jokeg.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\wuqil.exe"C:\Users\Admin\wuqil.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4276 -
C:\Users\Admin\shzin.exe"C:\Users\Admin\shzin.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Users\Admin\mauuje.exe"C:\Users\Admin\mauuje.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Users\Admin\mauuje.exe"C:\Users\Admin\mauuje.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4516 -
C:\Users\Admin\mioruw.exe"C:\Users\Admin\mioruw.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2104 -
C:\Users\Admin\xiuus.exe"C:\Users\Admin\xiuus.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2024 -
C:\Users\Admin\feodi.exe"C:\Users\Admin\feodi.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3244 -
C:\Users\Admin\muqiz.exe"C:\Users\Admin\muqiz.exe"28⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3736 -
C:\Users\Admin\bauuye.exe"C:\Users\Admin\bauuye.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2340 -
C:\Users\Admin\maeezup.exe"C:\Users\Admin\maeezup.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:376 -
C:\Users\Admin\wuabe.exe"C:\Users\Admin\wuabe.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1408 -
C:\Users\Admin\fauuq.exe"C:\Users\Admin\fauuq.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5040 -
C:\Users\Admin\mauug.exe"C:\Users\Admin\mauug.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Users\Admin\vplos.exe"C:\Users\Admin\vplos.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3376 -
C:\Users\Admin\cgqod.exe"C:\Users\Admin\cgqod.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Users\Admin\puinaaw.exe"C:\Users\Admin\puinaaw.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Users\Admin\boidu.exe"C:\Users\Admin\boidu.exe"37⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1544 -
C:\Users\Admin\neoohiz.exe"C:\Users\Admin\neoohiz.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:404 -
C:\Users\Admin\chxoim.exe"C:\Users\Admin\chxoim.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4860 -
C:\Users\Admin\mioruw.exe"C:\Users\Admin\mioruw.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4608 -
C:\Users\Admin\xeuus.exe"C:\Users\Admin\xeuus.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3516 -
C:\Users\Admin\ryxon.exe"C:\Users\Admin\ryxon.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:436 -
C:\Users\Admin\vauuq.exe"C:\Users\Admin\vauuq.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5056 -
C:\Users\Admin\qdzuas.exe"C:\Users\Admin\qdzuas.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:976 -
C:\Users\Admin\koejuuh.exe"C:\Users\Admin\koejuuh.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4420 -
C:\Users\Admin\saooxub.exe"C:\Users\Admin\saooxub.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4440 -
C:\Users\Admin\wuabe.exe"C:\Users\Admin\wuabe.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:968 -
C:\Users\Admin\mauub.exe"C:\Users\Admin\mauub.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2088 -
C:\Users\Admin\coilu.exe"C:\Users\Admin\coilu.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3656 -
C:\Users\Admin\shzip.exe"C:\Users\Admin\shzip.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3056 -
C:\Users\Admin\lauuh.exe"C:\Users\Admin\lauuh.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\Users\Admin\liuus.exe"C:\Users\Admin\liuus.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3124 -
C:\Users\Admin\vplos.exe"C:\Users\Admin\vplos.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4488 -
C:\Users\Admin\noidu.exe"C:\Users\Admin\noidu.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4848 -
C:\Users\Admin\rzqip.exe"C:\Users\Admin\rzqip.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1304
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
232KB
MD563fae68a5867e62f926407ef90e5fd0d
SHA11868f28eb8372f6f20d9a8c19fd130acb628c1c6
SHA25658397ec90b11e31d0f4bedb19ddc5cf811f27a36ba936fa4e08eb7801587689c
SHA512b9d4967a2401bed38cbea0413ea5e5fb89cf4280ea0cdfadbe5f410d043fd2170c58234991cbdd70d5a6d95c619853688b5fec0397a5728d6f6f00ca0da38ceb
-
Filesize
232KB
MD52d55e1335aae4e6beb1cea578a2a42b2
SHA181ca7675666bc7b7c26e4f2e437202c6ef6323d1
SHA256b707735c407ec7fe822fa79a9b0a1ba70694501ce81a7a8e4c428db54ee90228
SHA512beedc8f187fec0933a282bd94ca5bdb609d9ae316803273c0c455d329dc902ba82d70f60e29a9a46983c8ba0eaf08273ce90abd373cef7d2982fcc496f5cc4b9
-
Filesize
232KB
MD56289cfa70ec0d377d3ce8681f36b3df2
SHA187fb1c614c824b355db7f8edf2dca4f917e5d2e1
SHA25685ae86bb85b749fabe92d1de30d995da15eb4f9110142b72d6cb5b218ebb137f
SHA51241b92a66cb609051ba57325f394f5882670e9849a3324fc6a6d5523fb0c757ad7997df985e25a6c926d1e4df437227c3993549ffdf6e05ac7dc1cd85cc8b7c68
-
Filesize
232KB
MD588eadc3e518f67f67211098fff1f7a68
SHA1623555c3d95f76b2116a84915aa5ddfc293cab9f
SHA256c0de9cec9276a3f7d3a4a66a9ff87617d3e4d9bcd7d5e4e065af847969b6283a
SHA5121c0a5dbee070697c04e79e918c37acc74fbc88bcdee131aed4b2eb3e238f4049b02a07fd96f02de3a0d86794f0dbb3f02bf270cd763737afdb82046186a0e30f
-
Filesize
232KB
MD57b53e87f97218d02a7100c82cf469f46
SHA187eb4734f3e1aee652c14a357baf9a1e575680f5
SHA256f29b53e7bfdcf659217c40a6b3822ecb7b8d4ec7afa875dd7584e9cfaee71d39
SHA5129916f3b9cdc24f41f859de92c7077b78374076e8d9ab334ae381412fa5b60bb8fbb86dbf1af40334b759b30ea7c7e9496ceab0a439e2d9c902318cde79863d3b
-
Filesize
232KB
MD5a5b6d4ef46cf1f4e13b6f257f5ffbeef
SHA1d2d9a3c894763031b4e776bcdff048dfdc62fbf9
SHA2565af0f6919f247d32863cbe22c5ab38e2719518bf83210bc22b3dcb3e790fc9da
SHA51291a3db95f239f3a9bd99a712cc2912c7f8b00e880cb5e583246c50d660ad934b1f748ecc364e609d1bb44ed56c741f9fc04883f1e8aab2a2d3a880e30220002f
-
Filesize
232KB
MD55b9cddabee95fbf331b38ca490b3d5ec
SHA1dd9fe3c873df204dccc26fee94d81c1b6d95fffd
SHA256d7f8bc10457325ff008b0c985b192d51614dbd9add0193c1051c007242705a8a
SHA5121ffe37ef180986ce7daaede2c56742c68883879c97d179cd091d0e55b995ac4f8a2ff600db1d1e88358b1dc75fe006298bfec4aff2e0b7f50eb8130338ef6d4b
-
Filesize
232KB
MD5a561d6a9d64c97275501405121dc2a5b
SHA14033661e89326f8995e07bcd9ed5cd795766763b
SHA256ac8429f8f988068999c51d5eb0fa72fb91ae92b358aacbe07d860aee7745294f
SHA51267b0839152b7c6053aa512d06ad0d52a7a3424ab3727ac964521ecc9413f8822e6453b2a37b34ddac87804c02a2e2a2268a9943e301a2ef424f0264219cb68ee
-
Filesize
232KB
MD5bfe89b872ec501c7f6c607c437803509
SHA158eaac085458272489876da9b85c1df8367861cb
SHA2560a1f177ead2076a55e516d6e475d0fec8c5eaab26d25a27631795332de2fbb88
SHA51217c1a2f9ea9cf53e8d60ce42d25a7b49afdd64581e9cfd77e5f761edb44be91de2d78b124c8d397768f5a79e22f3160afe413d09b9df07c423ca4f15f8119d66
-
Filesize
232KB
MD5a35886782b3a742b8d40fb2c624b7d39
SHA19ab944b49e35dd37fbb4313fc6195889c18586ab
SHA25672d26414bab6ef526b6564a545ebb5be400b1b830d979da91cbf907732b2623a
SHA512330f41d4ea1448089f2eeeab5ca09ddf55583e3c8902fa53b9aa3c4be0a0e285b73af50c22f81c9251ad3264214fef605d24420e96e9b47dd2afd183fbb1d948
-
Filesize
232KB
MD5df5d04a9b91c93b8359654cfe77a2f3a
SHA159330cbecce3064f2e4cfc271680d7d85639db22
SHA2562b32d61c52263bb86ced2fb79cc1ecc91cec81131518f40ca0156572bfc572af
SHA5128684b47ddea2a6a1b7c3b8c601643b94c9371d70c6cb2bbb7ef9fcaf7c757951d089cb12d136d22dddf1cadaad0fcb27ef251c8b42f0c56826eb964d8ae0be16
-
Filesize
232KB
MD5ad78f2b197e04af5775d4bca5a6c22db
SHA1cbd27f4f4e4e99500a2fcf27b873b9bb4ebe25ea
SHA256c11ea78e3f04cd332006ef981def5d291769de6e6925e5429054e98e413c5c95
SHA512c49804b4e0848539a5a6b0b8a3b40339b48e50398e12b3b6632f662539df40080bff4cd541a57d09365c7458ad5a6e119801ac8057f2af18d934e0b2c1a05e20
-
Filesize
232KB
MD587ad5446d4c1866b4b62af9e8c0cbdf6
SHA1310603c162ed2d4ff3ae5b434358bcd78e91e2f0
SHA25617c81760d944e6cdf2e8b5f79d3c2d70932469498927a5271aeb14b5e8dee087
SHA5125612158baf0e7ab236d3c8ed529a3e54ae3fc7a8a4e71a16537d1521938f4664a0efd1f142389a324e502f957de0a1468a191364d6d8c2596b400e6d33f65b8e
-
Filesize
232KB
MD5a3bfd016258cb21f4e3d93216bd9fbe3
SHA1a107c3971385e52df427f1706291e034d01845cd
SHA2565a3c868122caf8d4837a041bc94799961983270cf261d7102ec28d14181791ec
SHA512719d55c174372687af97452a4e803c0ccd313420614e57502aa68ba5f0dec585c9c6b2a1d6ce7d191759374060b120250cd91a8f530f2a40cde8e01754598f83
-
Filesize
232KB
MD509be4d4a64cae7fe49441125358305cb
SHA18e7cff75d2670c425a5e8fd91d8fded1b08414cd
SHA256e4765a06c0161303c9481bd66762a02e2e1800f2b9101300f756065bd4afda39
SHA51279f8c40490bfb7a5b4abf0e2370eee2e25ca183dff148de26da994d94484b76714fb514d2f663e050966fb040f296292f1143fe07accff5d01fb930457def858
-
Filesize
232KB
MD519f2dc9c0f636b004e835e74f099fd31
SHA1856c4cf72cdf963a342f9394e9dfa5dd5de96a97
SHA2564f62ccfc9d903dd2fb04e455fb4bae99e6b57cd5d11dbb743c06f862ddf24bfa
SHA512e13a82c87041648273ac34a05cc163b4dc2568b06de27b43c0fc91db09521973c8e3541e4af611d300bce010cec70f31ccee41d70e279d902e6a7113d7b442a7
-
Filesize
232KB
MD584952f2f9f7f39e08820a082cf8a653f
SHA145ebba779cd2d2763e144ce6cbfdd63956e3f0c6
SHA2560a1194edc4b52c5914b993fbeb7b6944e0a18ff6fc28a5fc031532bff3818fb9
SHA51274aa54ae569740b970131832e36e3d35f5e3261ebdbbaa2856d6e55f2fe07189dbba1165d58f76d2e1a4ad9e4cef0faf07a6a2ae3040da7f1608c8db98e316f8
-
Filesize
232KB
MD571b4b35b21147604a440047234aefcbc
SHA147ddff48b990313a0d1464a1c231db3e40db33b2
SHA25610dd6cc2424ad87304d468c0494460e991712486602d3a56e46f18d17700f316
SHA512b2aabe1f1541ea2df3970a1c97801c986594ce41c2c12a918fa0828bac953f38c45f559502550924225081d7e7a15e13afbfec6a60e6d9a3592675b87219ab73
-
Filesize
232KB
MD5801dade90b3951b2731d9f7469695714
SHA11a020d92a37f43051802f86394a0309114b6b7a1
SHA256ccc9896b11179e8e65dfe3781fc18b9110c7289415993494ba1dcb979cb3b109
SHA512222743ceb892bc1e2ef533fabe6d060dfd9078668be4a6cec0e4d3114f64d50b0694d6a579b7e6e9271e9b1614c87933d77123f704603b1f01dea76f690c8ce6
-
Filesize
232KB
MD5ffcff67eed5f32fcbe9590d651238665
SHA1418e560fd56472f9709ea4cdacb7230b7359cf0f
SHA25619056198e6e4aaec011ed79be4c444d808b1cbe4041c6dadbde895733e3ecb6d
SHA512f98bbda20d57f7f20b23ff2ef07ebaf18def21942d35c796f091f58c1647474c14a88e7f337600279e6187637845ccc095ebb5c9a45752915b61fe1b74b50766
-
Filesize
232KB
MD543b15c3d3efe00f1e885a768b4383039
SHA1183dd01164bb7bb39810ba344df77a050f19b751
SHA2563ebc3ec863b828feda0f59d4895e71af574d949db43e81b8b39ee86ac392877e
SHA512bf65e89d6a1616020109549eac2bf52f6ec789c3f0a1fbc94c9d2d8df97126e186c4847d12c09d345d30a89c6c1da5f4cc0f856be8a9bfbf2125b750afd79ec6
-
Filesize
232KB
MD566566dec80b93e46d3c4417dd7631661
SHA1f144622e93b20e3c12a5d19309b9556a26b43b5f
SHA256bce11fc10b3c16c2b7272c33d14b91b49d92bae8155903cc28ca32a31bd0086d
SHA512a40a139353461bc245e13bf1ddbb292120d6df9ca87f8a4b82477e7d1215b8ecf87a80bbee9b3c39497cadc9713dc7158859eb46dcfc838d3d91403934a86267
-
Filesize
232KB
MD57ed66c52288e26f396328e6840ecb664
SHA120a0ff7d93b50d28d90fd345fcf6b759b49e1eb7
SHA2560d640ece5bc0e36e77f1844f50612575f319b10c674824e47eb13d91251180e4
SHA5127f78059507fef3696bc766a2ec7295c6349469f288260d4b34b0a64abd683561cf75ba7556cbedee2b7059b7a30027c884ecc166d8734d2cb0ed0d24eb9fce78
-
Filesize
232KB
MD57b2f5f4efc774eb4436ff26742059477
SHA1edcabe7af4f9ac9158d2772bc02dd746da6ae1f0
SHA25688c13bf3827d6ae72aa25c09ce532d9f81d3fd825dfe84b2abc550b59dc2572d
SHA512e55c35d9ab987655eaed4108658586aeb27346d1e85c04506ccc8f46f404ebcc40a419a3e94cb90b374f31d04f6cbcb496d1b6b9db091fe3b5bbef1b750230c8
-
Filesize
232KB
MD56bd498c06277a4117bc771c7b983cfa4
SHA17c8d3d812ee05d5bb61a9c255b8bb222dbdb40fd
SHA256c78c81e7890ff377c8e37b24e5507ef257f070709c22c14cf94266dd9c9b985f
SHA512658c7438ac5f82c5aece6a90b21955d1b1c099ca148e809a2f6cdee0721c5922b4e0d24b53f50e4938851cedec48c42dbd60d69254c049ab356fcf507c560a90
-
Filesize
232KB
MD5abd512e9c006c35320de1629b595abb0
SHA132e7b6d2a75205e246ecf827997703ea1ed12a03
SHA25662071263a4fed33adedd754f34f2b067343fc4f3b74bd8436f99610e5706e446
SHA51235d9bfa639c7bd4164ef8f6aead5a5be415530125f9916951decd8f31515661b9550cbd97ae7918ddafe16df48233b3ea15b3642ecb07220c03b46d29dc3a6e0
-
Filesize
232KB
MD5ec7446df8e7a7de32e04a09423bdde6a
SHA1498761cdb5643d915220a4406c456f3241d09d63
SHA2564c63b2f3b8efa6927de8f193dfbc537ef607eca0ad053d55d0cd5d0434783900
SHA5125e06172c3384dab594175759e14bf7a7cc36191663ab1770ad9f4c9b5eb8626a744527265d13788cab622a04052c248c0a65341ec6c386812cb33c0d65bd3a72
-
Filesize
232KB
MD5a23e0296bb41916fc39a1b94aa5b239c
SHA1bb579a58e6769332ed4bbe0f972068ec5f8e6dee
SHA25620b5aaf3ff261e64b3de7161da8dbff8113cfbe551377d89f62ddf7ce6636982
SHA512b58a01bcc5639c682cc3ad7b0504f74ba1e6e8eff3b6c1beddbdf0ef510d651e075511b82a1b395b24ea6a7cbe51ab3638ef4071c77f09916fb3ddfadf8ecb7f
-
Filesize
232KB
MD5ac19f7d80fe7279cd77f19ef36bc4e9d
SHA126ddf7d04a88b0cb21ced100bf7948df67530150
SHA2560cdb5945bd1920bbfc3687026eab2612604c1c455b5fee240c5433951fb9bc17
SHA5121fdd10e55c10c3a948e15a8f4b1484c8a5851dfecf8cb91bb268bfa2b616496fb4e4fcfda7f211f40df7a0a8ec29959df11e47b1239839010531c2963e6b6bbe