Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
97s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 00:39
Static task
static1
Behavioral task
behavioral1
Sample
9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe
Resource
win10v2004-20240704-en
General
-
Target
9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe
-
Size
1.0MB
-
MD5
d0bcac4da3a6de1274c3803f1859f0e6
-
SHA1
e536d602aa55999c965f7b892484f80591c2a611
-
SHA256
9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b
-
SHA512
f2b3a1cd9c330969a06b90e9110a43898a22810b4c4615a5f7aa08ddd2868028e1af6f349fb4f030b3ca555bba9a8b4c0edbba7593a5ec62e6a2d675d2019faa
-
SSDEEP
24576:FqOMFH5BhM6RwleQktOot0h9HyrOOfGOAY:4OMFHa6meHt0jSrOk
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2056 5Q5YV.exe 2148 A68IR.exe 2760 BH40U.exe 2732 885L6.exe 2908 63Q55.exe 2736 JY26X.exe 1696 XVNWJ.exe 2596 JDZV6.exe 2008 0LH7Q.exe 3016 RO5ZG.exe 1956 GCE34.exe 2096 5JHN1.exe 2252 D02CR.exe 1368 609F1.exe 2396 54085.exe 2580 18XQF.exe 2584 20TFB.exe 980 05421.exe 1872 IDR3M.exe 1612 Z3806.exe 2188 9NLE7.exe 584 R55A6.exe 2472 N5DBO.exe 2368 9TCD8.exe 2924 LP426.exe 2608 R3M02.exe 2680 4SLO7.exe 852 333X9.exe 2976 KUS86.exe 2800 HG85O.exe 1452 C7392.exe 1988 K905K.exe 1124 A8O3R.exe 1756 5C1H7.exe 2360 GZ9M6.exe 2100 56A2T.exe 2312 Z3090.exe 1904 C2TUB.exe 780 7VEBD.exe 1020 Y1CV7.exe 1400 124G2.exe 1980 U48D9.exe 1884 18XW3.exe 560 4IQOM.exe 2492 YB61Q.exe 1872 56484.exe 2236 9EEJG.exe 468 BP931.exe 2708 AW1S6.exe 1476 I6ZLA.exe 2760 55KZ8.exe 2368 OJ9LZ.exe 2788 XO477.exe 1172 8U43D.exe 2784 FS8PE.exe 2684 GX2K8.exe 2948 96HVN.exe 1352 48013.exe 880 4OAW5.exe 1632 0O5IA.exe 3040 X0CW0.exe 2036 U4053.exe 2080 909I5.exe 2244 NOE37.exe -
Loads dropped DLL 64 IoCs
pid Process 1420 9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe 1420 9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe 2056 5Q5YV.exe 2056 5Q5YV.exe 2148 A68IR.exe 2148 A68IR.exe 2760 BH40U.exe 2760 BH40U.exe 2732 885L6.exe 2732 885L6.exe 2908 63Q55.exe 2908 63Q55.exe 2736 JY26X.exe 2736 JY26X.exe 1696 XVNWJ.exe 1696 XVNWJ.exe 2596 JDZV6.exe 2596 JDZV6.exe 2008 0LH7Q.exe 2008 0LH7Q.exe 3016 RO5ZG.exe 3016 RO5ZG.exe 1956 GCE34.exe 1956 GCE34.exe 2096 5JHN1.exe 2096 5JHN1.exe 2252 D02CR.exe 2252 D02CR.exe 1368 609F1.exe 1368 609F1.exe 2396 54085.exe 2396 54085.exe 2580 18XQF.exe 2580 18XQF.exe 2584 20TFB.exe 2584 20TFB.exe 980 05421.exe 980 05421.exe 1872 IDR3M.exe 1872 IDR3M.exe 1612 Z3806.exe 1612 Z3806.exe 2188 9NLE7.exe 2188 9NLE7.exe 584 R55A6.exe 584 R55A6.exe 2472 N5DBO.exe 2472 N5DBO.exe 2368 9TCD8.exe 2368 9TCD8.exe 2924 LP426.exe 2924 LP426.exe 2608 R3M02.exe 2608 R3M02.exe 2680 4SLO7.exe 2680 4SLO7.exe 852 333X9.exe 852 333X9.exe 2976 KUS86.exe 2976 KUS86.exe 2800 HG85O.exe 2800 HG85O.exe 1452 C7392.exe 1452 C7392.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1420 9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe 1420 9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe 2056 5Q5YV.exe 2056 5Q5YV.exe 2148 A68IR.exe 2148 A68IR.exe 2760 BH40U.exe 2760 BH40U.exe 2732 885L6.exe 2732 885L6.exe 2908 63Q55.exe 2908 63Q55.exe 2736 JY26X.exe 2736 JY26X.exe 1696 XVNWJ.exe 1696 XVNWJ.exe 2596 JDZV6.exe 2596 JDZV6.exe 2008 0LH7Q.exe 2008 0LH7Q.exe 3016 RO5ZG.exe 3016 RO5ZG.exe 1956 GCE34.exe 1956 GCE34.exe 2096 5JHN1.exe 2096 5JHN1.exe 2252 D02CR.exe 2252 D02CR.exe 1368 609F1.exe 1368 609F1.exe 2396 54085.exe 2396 54085.exe 2580 18XQF.exe 2580 18XQF.exe 2584 20TFB.exe 2584 20TFB.exe 980 05421.exe 980 05421.exe 1872 IDR3M.exe 1872 IDR3M.exe 1612 Z3806.exe 1612 Z3806.exe 2188 9NLE7.exe 2188 9NLE7.exe 584 R55A6.exe 584 R55A6.exe 2472 N5DBO.exe 2472 N5DBO.exe 2368 9TCD8.exe 2368 9TCD8.exe 2924 LP426.exe 2924 LP426.exe 2608 R3M02.exe 2608 R3M02.exe 2680 4SLO7.exe 2680 4SLO7.exe 852 333X9.exe 852 333X9.exe 2976 KUS86.exe 2976 KUS86.exe 2800 HG85O.exe 2800 HG85O.exe 1452 C7392.exe 1452 C7392.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1420 wrote to memory of 2056 1420 9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe 30 PID 1420 wrote to memory of 2056 1420 9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe 30 PID 1420 wrote to memory of 2056 1420 9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe 30 PID 1420 wrote to memory of 2056 1420 9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe 30 PID 2056 wrote to memory of 2148 2056 5Q5YV.exe 31 PID 2056 wrote to memory of 2148 2056 5Q5YV.exe 31 PID 2056 wrote to memory of 2148 2056 5Q5YV.exe 31 PID 2056 wrote to memory of 2148 2056 5Q5YV.exe 31 PID 2148 wrote to memory of 2760 2148 A68IR.exe 32 PID 2148 wrote to memory of 2760 2148 A68IR.exe 32 PID 2148 wrote to memory of 2760 2148 A68IR.exe 32 PID 2148 wrote to memory of 2760 2148 A68IR.exe 32 PID 2760 wrote to memory of 2732 2760 BH40U.exe 33 PID 2760 wrote to memory of 2732 2760 BH40U.exe 33 PID 2760 wrote to memory of 2732 2760 BH40U.exe 33 PID 2760 wrote to memory of 2732 2760 BH40U.exe 33 PID 2732 wrote to memory of 2908 2732 885L6.exe 34 PID 2732 wrote to memory of 2908 2732 885L6.exe 34 PID 2732 wrote to memory of 2908 2732 885L6.exe 34 PID 2732 wrote to memory of 2908 2732 885L6.exe 34 PID 2908 wrote to memory of 2736 2908 63Q55.exe 35 PID 2908 wrote to memory of 2736 2908 63Q55.exe 35 PID 2908 wrote to memory of 2736 2908 63Q55.exe 35 PID 2908 wrote to memory of 2736 2908 63Q55.exe 35 PID 2736 wrote to memory of 1696 2736 JY26X.exe 36 PID 2736 wrote to memory of 1696 2736 JY26X.exe 36 PID 2736 wrote to memory of 1696 2736 JY26X.exe 36 PID 2736 wrote to memory of 1696 2736 JY26X.exe 36 PID 1696 wrote to memory of 2596 1696 XVNWJ.exe 37 PID 1696 wrote to memory of 2596 1696 XVNWJ.exe 37 PID 1696 wrote to memory of 2596 1696 XVNWJ.exe 37 PID 1696 wrote to memory of 2596 1696 XVNWJ.exe 37 PID 2596 wrote to memory of 2008 2596 JDZV6.exe 38 PID 2596 wrote to memory of 2008 2596 JDZV6.exe 38 PID 2596 wrote to memory of 2008 2596 JDZV6.exe 38 PID 2596 wrote to memory of 2008 2596 JDZV6.exe 38 PID 2008 wrote to memory of 3016 2008 0LH7Q.exe 39 PID 2008 wrote to memory of 3016 2008 0LH7Q.exe 39 PID 2008 wrote to memory of 3016 2008 0LH7Q.exe 39 PID 2008 wrote to memory of 3016 2008 0LH7Q.exe 39 PID 3016 wrote to memory of 1956 3016 RO5ZG.exe 40 PID 3016 wrote to memory of 1956 3016 RO5ZG.exe 40 PID 3016 wrote to memory of 1956 3016 RO5ZG.exe 40 PID 3016 wrote to memory of 1956 3016 RO5ZG.exe 40 PID 1956 wrote to memory of 2096 1956 GCE34.exe 42 PID 1956 wrote to memory of 2096 1956 GCE34.exe 42 PID 1956 wrote to memory of 2096 1956 GCE34.exe 42 PID 1956 wrote to memory of 2096 1956 GCE34.exe 42 PID 2096 wrote to memory of 2252 2096 5JHN1.exe 43 PID 2096 wrote to memory of 2252 2096 5JHN1.exe 43 PID 2096 wrote to memory of 2252 2096 5JHN1.exe 43 PID 2096 wrote to memory of 2252 2096 5JHN1.exe 43 PID 2252 wrote to memory of 1368 2252 D02CR.exe 44 PID 2252 wrote to memory of 1368 2252 D02CR.exe 44 PID 2252 wrote to memory of 1368 2252 D02CR.exe 44 PID 2252 wrote to memory of 1368 2252 D02CR.exe 44 PID 1368 wrote to memory of 2396 1368 609F1.exe 45 PID 1368 wrote to memory of 2396 1368 609F1.exe 45 PID 1368 wrote to memory of 2396 1368 609F1.exe 45 PID 1368 wrote to memory of 2396 1368 609F1.exe 45 PID 2396 wrote to memory of 2580 2396 54085.exe 46 PID 2396 wrote to memory of 2580 2396 54085.exe 46 PID 2396 wrote to memory of 2580 2396 54085.exe 46 PID 2396 wrote to memory of 2580 2396 54085.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe"C:\Users\Admin\AppData\Local\Temp\9939f0759f4abd4856a0300e2d92cc427f877a1851f02cf311de99293f88244b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\5Q5YV.exe"C:\Users\Admin\AppData\Local\Temp\5Q5YV.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\A68IR.exe"C:\Users\Admin\AppData\Local\Temp\A68IR.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\BH40U.exe"C:\Users\Admin\AppData\Local\Temp\BH40U.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\885L6.exe"C:\Users\Admin\AppData\Local\Temp\885L6.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\63Q55.exe"C:\Users\Admin\AppData\Local\Temp\63Q55.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\JY26X.exe"C:\Users\Admin\AppData\Local\Temp\JY26X.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\XVNWJ.exe"C:\Users\Admin\AppData\Local\Temp\XVNWJ.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\JDZV6.exe"C:\Users\Admin\AppData\Local\Temp\JDZV6.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\0LH7Q.exe"C:\Users\Admin\AppData\Local\Temp\0LH7Q.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\RO5ZG.exe"C:\Users\Admin\AppData\Local\Temp\RO5ZG.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\GCE34.exe"C:\Users\Admin\AppData\Local\Temp\GCE34.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\5JHN1.exe"C:\Users\Admin\AppData\Local\Temp\5JHN1.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\D02CR.exe"C:\Users\Admin\AppData\Local\Temp\D02CR.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\609F1.exe"C:\Users\Admin\AppData\Local\Temp\609F1.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\54085.exe"C:\Users\Admin\AppData\Local\Temp\54085.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\18XQF.exe"C:\Users\Admin\AppData\Local\Temp\18XQF.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\20TFB.exe"C:\Users\Admin\AppData\Local\Temp\20TFB.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\05421.exe"C:\Users\Admin\AppData\Local\Temp\05421.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:980 -
C:\Users\Admin\AppData\Local\Temp\IDR3M.exe"C:\Users\Admin\AppData\Local\Temp\IDR3M.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\Z3806.exe"C:\Users\Admin\AppData\Local\Temp\Z3806.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\9NLE7.exe"C:\Users\Admin\AppData\Local\Temp\9NLE7.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\R55A6.exe"C:\Users\Admin\AppData\Local\Temp\R55A6.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:584 -
C:\Users\Admin\AppData\Local\Temp\N5DBO.exe"C:\Users\Admin\AppData\Local\Temp\N5DBO.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\9TCD8.exe"C:\Users\Admin\AppData\Local\Temp\9TCD8.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\LP426.exe"C:\Users\Admin\AppData\Local\Temp\LP426.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\R3M02.exe"C:\Users\Admin\AppData\Local\Temp\R3M02.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\4SLO7.exe"C:\Users\Admin\AppData\Local\Temp\4SLO7.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\333X9.exe"C:\Users\Admin\AppData\Local\Temp\333X9.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:852 -
C:\Users\Admin\AppData\Local\Temp\KUS86.exe"C:\Users\Admin\AppData\Local\Temp\KUS86.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\HG85O.exe"C:\Users\Admin\AppData\Local\Temp\HG85O.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\C7392.exe"C:\Users\Admin\AppData\Local\Temp\C7392.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\K905K.exe"C:\Users\Admin\AppData\Local\Temp\K905K.exe"33⤵
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\A8O3R.exe"C:\Users\Admin\AppData\Local\Temp\A8O3R.exe"34⤵
- Executes dropped EXE
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\5C1H7.exe"C:\Users\Admin\AppData\Local\Temp\5C1H7.exe"35⤵
- Executes dropped EXE
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\GZ9M6.exe"C:\Users\Admin\AppData\Local\Temp\GZ9M6.exe"36⤵
- Executes dropped EXE
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\56A2T.exe"C:\Users\Admin\AppData\Local\Temp\56A2T.exe"37⤵
- Executes dropped EXE
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\Z3090.exe"C:\Users\Admin\AppData\Local\Temp\Z3090.exe"38⤵
- Executes dropped EXE
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\C2TUB.exe"C:\Users\Admin\AppData\Local\Temp\C2TUB.exe"39⤵
- Executes dropped EXE
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\7VEBD.exe"C:\Users\Admin\AppData\Local\Temp\7VEBD.exe"40⤵
- Executes dropped EXE
PID:780 -
C:\Users\Admin\AppData\Local\Temp\Y1CV7.exe"C:\Users\Admin\AppData\Local\Temp\Y1CV7.exe"41⤵
- Executes dropped EXE
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\124G2.exe"C:\Users\Admin\AppData\Local\Temp\124G2.exe"42⤵
- Executes dropped EXE
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\U48D9.exe"C:\Users\Admin\AppData\Local\Temp\U48D9.exe"43⤵
- Executes dropped EXE
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\18XW3.exe"C:\Users\Admin\AppData\Local\Temp\18XW3.exe"44⤵
- Executes dropped EXE
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\4IQOM.exe"C:\Users\Admin\AppData\Local\Temp\4IQOM.exe"45⤵
- Executes dropped EXE
PID:560 -
C:\Users\Admin\AppData\Local\Temp\YB61Q.exe"C:\Users\Admin\AppData\Local\Temp\YB61Q.exe"46⤵
- Executes dropped EXE
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\56484.exe"C:\Users\Admin\AppData\Local\Temp\56484.exe"47⤵
- Executes dropped EXE
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\9EEJG.exe"C:\Users\Admin\AppData\Local\Temp\9EEJG.exe"48⤵
- Executes dropped EXE
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\BP931.exe"C:\Users\Admin\AppData\Local\Temp\BP931.exe"49⤵
- Executes dropped EXE
PID:468 -
C:\Users\Admin\AppData\Local\Temp\AW1S6.exe"C:\Users\Admin\AppData\Local\Temp\AW1S6.exe"50⤵
- Executes dropped EXE
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\I6ZLA.exe"C:\Users\Admin\AppData\Local\Temp\I6ZLA.exe"51⤵
- Executes dropped EXE
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\55KZ8.exe"C:\Users\Admin\AppData\Local\Temp\55KZ8.exe"52⤵
- Executes dropped EXE
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\OJ9LZ.exe"C:\Users\Admin\AppData\Local\Temp\OJ9LZ.exe"53⤵
- Executes dropped EXE
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\XO477.exe"C:\Users\Admin\AppData\Local\Temp\XO477.exe"54⤵
- Executes dropped EXE
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\8U43D.exe"C:\Users\Admin\AppData\Local\Temp\8U43D.exe"55⤵
- Executes dropped EXE
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\FS8PE.exe"C:\Users\Admin\AppData\Local\Temp\FS8PE.exe"56⤵
- Executes dropped EXE
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\GX2K8.exe"C:\Users\Admin\AppData\Local\Temp\GX2K8.exe"57⤵
- Executes dropped EXE
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\96HVN.exe"C:\Users\Admin\AppData\Local\Temp\96HVN.exe"58⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\48013.exe"C:\Users\Admin\AppData\Local\Temp\48013.exe"59⤵
- Executes dropped EXE
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\4OAW5.exe"C:\Users\Admin\AppData\Local\Temp\4OAW5.exe"60⤵
- Executes dropped EXE
PID:880 -
C:\Users\Admin\AppData\Local\Temp\0O5IA.exe"C:\Users\Admin\AppData\Local\Temp\0O5IA.exe"61⤵
- Executes dropped EXE
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\X0CW0.exe"C:\Users\Admin\AppData\Local\Temp\X0CW0.exe"62⤵
- Executes dropped EXE
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\U4053.exe"C:\Users\Admin\AppData\Local\Temp\U4053.exe"63⤵
- Executes dropped EXE
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\909I5.exe"C:\Users\Admin\AppData\Local\Temp\909I5.exe"64⤵
- Executes dropped EXE
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\NOE37.exe"C:\Users\Admin\AppData\Local\Temp\NOE37.exe"65⤵
- Executes dropped EXE
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\HZ9P0.exe"C:\Users\Admin\AppData\Local\Temp\HZ9P0.exe"66⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\ZC50O.exe"C:\Users\Admin\AppData\Local\Temp\ZC50O.exe"67⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\1XD30.exe"C:\Users\Admin\AppData\Local\Temp\1XD30.exe"68⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\K570S.exe"C:\Users\Admin\AppData\Local\Temp\K570S.exe"69⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\O25FJ.exe"C:\Users\Admin\AppData\Local\Temp\O25FJ.exe"70⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\S9J58.exe"C:\Users\Admin\AppData\Local\Temp\S9J58.exe"71⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\KSLDF.exe"C:\Users\Admin\AppData\Local\Temp\KSLDF.exe"72⤵PID:1112
-
C:\Users\Admin\AppData\Local\Temp\S9FN0.exe"C:\Users\Admin\AppData\Local\Temp\S9FN0.exe"73⤵PID:980
-
C:\Users\Admin\AppData\Local\Temp\LPG6I.exe"C:\Users\Admin\AppData\Local\Temp\LPG6I.exe"74⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\7E022.exe"C:\Users\Admin\AppData\Local\Temp\7E022.exe"75⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\15624.exe"C:\Users\Admin\AppData\Local\Temp\15624.exe"76⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\IHBQB.exe"C:\Users\Admin\AppData\Local\Temp\IHBQB.exe"77⤵PID:1104
-
C:\Users\Admin\AppData\Local\Temp\2UKKI.exe"C:\Users\Admin\AppData\Local\Temp\2UKKI.exe"78⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\G25V7.exe"C:\Users\Admin\AppData\Local\Temp\G25V7.exe"79⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\730K2.exe"C:\Users\Admin\AppData\Local\Temp\730K2.exe"80⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\W2AC2.exe"C:\Users\Admin\AppData\Local\Temp\W2AC2.exe"81⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\H2506.exe"C:\Users\Admin\AppData\Local\Temp\H2506.exe"82⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\BS2LY.exe"C:\Users\Admin\AppData\Local\Temp\BS2LY.exe"83⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\5463A.exe"C:\Users\Admin\AppData\Local\Temp\5463A.exe"84⤵PID:2704
-
C:\Users\Admin\AppData\Local\Temp\5GR05.exe"C:\Users\Admin\AppData\Local\Temp\5GR05.exe"85⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\FIV98.exe"C:\Users\Admin\AppData\Local\Temp\FIV98.exe"86⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\3BENM.exe"C:\Users\Admin\AppData\Local\Temp\3BENM.exe"87⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\993ZN.exe"C:\Users\Admin\AppData\Local\Temp\993ZN.exe"88⤵PID:1720
-
C:\Users\Admin\AppData\Local\Temp\A2E04.exe"C:\Users\Admin\AppData\Local\Temp\A2E04.exe"89⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\JJDPT.exe"C:\Users\Admin\AppData\Local\Temp\JJDPT.exe"90⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\CSSG1.exe"C:\Users\Admin\AppData\Local\Temp\CSSG1.exe"91⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\8ZBIQ.exe"C:\Users\Admin\AppData\Local\Temp\8ZBIQ.exe"92⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\FCKT1.exe"C:\Users\Admin\AppData\Local\Temp\FCKT1.exe"93⤵PID:2100
-
C:\Users\Admin\AppData\Local\Temp\2NG34.exe"C:\Users\Admin\AppData\Local\Temp\2NG34.exe"94⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\14702.exe"C:\Users\Admin\AppData\Local\Temp\14702.exe"95⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\21OBR.exe"C:\Users\Admin\AppData\Local\Temp\21OBR.exe"96⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\6FEU7.exe"C:\Users\Admin\AppData\Local\Temp\6FEU7.exe"97⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\05018.exe"C:\Users\Admin\AppData\Local\Temp\05018.exe"98⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\L5C7W.exe"C:\Users\Admin\AppData\Local\Temp\L5C7W.exe"99⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\32U6M.exe"C:\Users\Admin\AppData\Local\Temp\32U6M.exe"100⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\HT075.exe"C:\Users\Admin\AppData\Local\Temp\HT075.exe"101⤵PID:1604
-
C:\Users\Admin\AppData\Local\Temp\G3Z4Z.exe"C:\Users\Admin\AppData\Local\Temp\G3Z4Z.exe"102⤵PID:2492
-
C:\Users\Admin\AppData\Local\Temp\H2BGS.exe"C:\Users\Admin\AppData\Local\Temp\H2BGS.exe"103⤵PID:1420
-
C:\Users\Admin\AppData\Local\Temp\9IYY2.exe"C:\Users\Admin\AppData\Local\Temp\9IYY2.exe"104⤵PID:2292
-
C:\Users\Admin\AppData\Local\Temp\D913N.exe"C:\Users\Admin\AppData\Local\Temp\D913N.exe"105⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\YJE63.exe"C:\Users\Admin\AppData\Local\Temp\YJE63.exe"106⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\V072A.exe"C:\Users\Admin\AppData\Local\Temp\V072A.exe"107⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\4I199.exe"C:\Users\Admin\AppData\Local\Temp\4I199.exe"108⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\8H8HN.exe"C:\Users\Admin\AppData\Local\Temp\8H8HN.exe"109⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\Z856Z.exe"C:\Users\Admin\AppData\Local\Temp\Z856Z.exe"110⤵PID:2908
-
C:\Users\Admin\AppData\Local\Temp\X5Q0B.exe"C:\Users\Admin\AppData\Local\Temp\X5Q0B.exe"111⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\7SIM0.exe"C:\Users\Admin\AppData\Local\Temp\7SIM0.exe"112⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\FATJ2.exe"C:\Users\Admin\AppData\Local\Temp\FATJ2.exe"113⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\0BP40.exe"C:\Users\Admin\AppData\Local\Temp\0BP40.exe"114⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\T6F2N.exe"C:\Users\Admin\AppData\Local\Temp\T6F2N.exe"115⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\17BPJ.exe"C:\Users\Admin\AppData\Local\Temp\17BPJ.exe"116⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\A8S95.exe"C:\Users\Admin\AppData\Local\Temp\A8S95.exe"117⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\5PD29.exe"C:\Users\Admin\AppData\Local\Temp\5PD29.exe"118⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\USME2.exe"C:\Users\Admin\AppData\Local\Temp\USME2.exe"119⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\92L2Q.exe"C:\Users\Admin\AppData\Local\Temp\92L2Q.exe"120⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\R1185.exe"C:\Users\Admin\AppData\Local\Temp\R1185.exe"121⤵PID:736
-
C:\Users\Admin\AppData\Local\Temp\LSAV5.exe"C:\Users\Admin\AppData\Local\Temp\LSAV5.exe"122⤵PID:856
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-