Analysis
-
max time kernel
63s -
max time network
67s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/08/2024, 19:17
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://cdn.discordapp.com/attachments/1250123717283942571/1257297706884534282/Loader.exe?ex=66ae153c&is=66acc3bc&hm=5984b63bead50f7311434ab816dd785cb6f31588f6c886728e76a3aceabf2757&
Resource
win10v2004-20240802-en
14 signatures
150 seconds
General
-
Target
https://cdn.discordapp.com/attachments/1250123717283942571/1257297706884534282/Loader.exe?ex=66ae153c&is=66acc3bc&hm=5984b63bead50f7311434ab816dd785cb6f31588f6c886728e76a3aceabf2757&
Score
8/10
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 64 IoCs
pid Process 4476 Loader.exe 1888 Loader.exe 364 Loader.exe 4904 Loader.exe 4048 Loader.exe 948 Loader.exe 4736 Loader.exe 1580 Loader.exe 2288 Loader.exe 3140 Loader.exe 3104 Loader.exe 1096 Loader.exe 2088 Loader.exe 432 Loader.exe 3868 Loader.exe 3100 Loader.exe 472 Loader.exe 3700 Loader.exe 2104 Loader.exe 4708 Loader.exe 2596 Loader.exe 2452 Loader.exe 1324 Loader.exe 4428 Loader.exe 1076 Loader.exe 4648 Loader.exe 4716 Loader.exe 2736 Loader.exe 1344 Loader.exe 4592 Loader.exe 2404 Loader.exe 660 Loader.exe 4544 Loader.exe 4676 Loader.exe 4980 Loader.exe 2136 Loader.exe 2036 Loader.exe 3068 Loader.exe 2944 Loader.exe 4272 Loader.exe 3968 Loader.exe 4436 Loader.exe 976 Loader.exe 3368 Loader.exe 728 Loader.exe 1092 Loader.exe 4844 Loader.exe 1032 Loader.exe 1356 Loader.exe 1432 Loader.exe 3192 Loader.exe 3556 Loader.exe 2704 Loader.exe 3544 Loader.exe 5080 Loader.exe 2804 Loader.exe 2928 Loader.exe 220 Loader.exe 3716 Loader.exe 1652 Loader.exe 3680 Loader.exe 2208 Loader.exe 4356 Loader.exe 4744 Loader.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer msedge.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName msedge.exe -
Modifies registry class 51 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\LogicalViewMode = "2" Loader.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Loader.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Loader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1" Loader.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\IconSize = "16" Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\LogicalViewMode = "1" Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\NodeSlot = "2" Loader.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Loader.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg Loader.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Loader.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Loader.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1092616257" Loader.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 0202 Loader.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Loader.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByDirection = "4294967295" Loader.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Loader.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:PID = "4" Loader.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e8005398e082303024b98265d99428e115f0000 Loader.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2 Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByDirection = "1" Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\FFlags = "1" Loader.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7} Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\FFlags = "1092616257" Loader.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupView = "4294967295" Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\GroupByKey:PID = "14" Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Mode = "6" Loader.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Loader.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a000000a000000030f125b7ef471a10a5f102608c9eebac04000000c8000000354b179bff40d211a27e00c04fc308710300000080000000354b179bff40d211a27e00c04fc308710200000080000000 Loader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupByKey:FMTID = "{B725F130-47EF-101A-A5F1-02608C9EEBAC}" Loader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\KnownFolderDerivedFolderType = "{885A186E-A440-4ADA-812B-DB871B942259}" Loader.exe Set value (str) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Downloads" Loader.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Loader.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0a00000001000000 Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\GroupView = "4294967295" Loader.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Loader.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Loader.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\ColInfo = 00000000000000000000000000000000fddfdffd100000000000000000000000040000001800000030f125b7ef471a10a5f102608c9eebac0a0000001001000030f125b7ef471a10a5f102608c9eebac0e0000009000000030f125b7ef471a10a5f102608c9eebac040000007800000030f125b7ef471a10a5f102608c9eebac0c00000050000000 Loader.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259} Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Mode = "4" Loader.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Sort = 000000000000000000000000000000000100000030f125b7ef471a10a5f102608c9eebac0e000000ffffffff Loader.exe Key created \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\{885A186E-A440-4ADA-812B-DB871B942259}\Version = "1" Loader.exe Set value (data) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Loader.exe Set value (int) \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\2\ComDlg\{5C4F28B5-F869-4E84-8E60-F11DB97C5CC7}\IconSize = "48" Loader.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\Downloads\Unconfirmed 154526.crdownload:SmartScreen msedge.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2220 msedge.exe 2220 msedge.exe 3648 msedge.exe 3648 msedge.exe 3628 identity_helper.exe 3628 identity_helper.exe 1680 msedge.exe 1680 msedge.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4476 Loader.exe -
Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary 7 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe -
Suspicious use of FindShellTrayWindow 36 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe 3648 msedge.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4476 Loader.exe 4476 Loader.exe 1888 Loader.exe 364 Loader.exe 4904 Loader.exe 4048 Loader.exe 948 Loader.exe 4736 Loader.exe 1580 Loader.exe 2288 Loader.exe 3140 Loader.exe 3104 Loader.exe 1096 Loader.exe 2088 Loader.exe 432 Loader.exe 3868 Loader.exe 3100 Loader.exe 472 Loader.exe 3700 Loader.exe 2104 Loader.exe 4708 Loader.exe 2596 Loader.exe 2452 Loader.exe 1324 Loader.exe 4428 Loader.exe 1076 Loader.exe 4648 Loader.exe 4716 Loader.exe 2736 Loader.exe 1344 Loader.exe 4592 Loader.exe 2404 Loader.exe 660 Loader.exe 4544 Loader.exe 4676 Loader.exe 4980 Loader.exe 2136 Loader.exe 2036 Loader.exe 3068 Loader.exe 2944 Loader.exe 4272 Loader.exe 3968 Loader.exe 4436 Loader.exe 976 Loader.exe 3368 Loader.exe 728 Loader.exe 1092 Loader.exe 4844 Loader.exe 1032 Loader.exe 1356 Loader.exe 1432 Loader.exe 3192 Loader.exe 3556 Loader.exe 2704 Loader.exe 3544 Loader.exe 5080 Loader.exe 2804 Loader.exe 2928 Loader.exe 220 Loader.exe 3716 Loader.exe 1652 Loader.exe 3680 Loader.exe 2208 Loader.exe 4356 Loader.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3648 wrote to memory of 3704 3648 msedge.exe 81 PID 3648 wrote to memory of 3704 3648 msedge.exe 81 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 1432 3648 msedge.exe 82 PID 3648 wrote to memory of 2220 3648 msedge.exe 83 PID 3648 wrote to memory of 2220 3648 msedge.exe 83 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84 PID 3648 wrote to memory of 4764 3648 msedge.exe 84
Processes
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --single-argument https://cdn.discordapp.com/attachments/1250123717283942571/1257297706884534282/Loader.exe?ex=66ae153c&is=66acc3bc&hm=5984b63bead50f7311434ab816dd785cb6f31588f6c886728e76a3aceabf2757&1⤵
- Enumerates system info in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: NtCreateUserProcessBlockNonMicrosoftBinary
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=92.0.4515.131 "--annotation=exe=C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win64 "--annotation=prod=Microsoft Edge" --annotation=ver=92.0.902.67 --initial-client-data=0xfc,0x100,0x104,0xd8,0x108,0x7ffdbf0b46f8,0x7ffdbf0b4708,0x7ffdbf0b47182⤵PID:3704
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=gpu-process --field-trial-handle=2096,44616155383443833,16191999359683728358,131072 --gpu-preferences=UAAAAAAAAADgAAAQAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAHgAAAAAAAAAeAAAAAAAAAAoAAAABAAAACAAAAAAAAAAKAAAAAAAAAAwAAAAAAAAADgAAAAAAAAAEAAAAAAAAAAAAAAADQAAABAAAAAAAAAAAQAAAA0AAAAQAAAAAAAAAAQAAAANAAAAEAAAAAAAAAAHAAAADQAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2104 /prefetch:22⤵PID:1432
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=2096,44616155383443833,16191999359683728358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2156 /prefetch:32⤵
- Suspicious behavior: EnumeratesProcesses
PID:2220
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --field-trial-handle=2096,44616155383443833,16191999359683728358,131072 --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=2924 /prefetch:82⤵PID:4764
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,44616155383443833,16191999359683728358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3360 /prefetch:12⤵PID:312
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,44616155383443833,16191999359683728358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=3372 /prefetch:12⤵PID:3680
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,44616155383443833,16191999359683728358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵PID:3916
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe"C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\identity_helper.exe" --type=utility --utility-sub-type=winrt_app_id.mojom.WinrtAppIdService --field-trial-handle=2096,44616155383443833,16191999359683728358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5372 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:3628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,44616155383443833,16191999359683728358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5432 /prefetch:12⤵PID:2588
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,44616155383443833,16191999359683728358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=9 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5448 /prefetch:12⤵PID:1960
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=edge_collections.mojom.CollectionsDataManager --field-trial-handle=2096,44616155383443833,16191999359683728358,131072 --lang=en-US --service-sandbox-type=collections --mojo-platform-channel-handle=2600 /prefetch:82⤵PID:1288
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,44616155383443833,16191999359683728358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=12 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=5680 /prefetch:12⤵PID:4072
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --field-trial-handle=2096,44616155383443833,16191999359683728358,131072 --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=6188 /prefetch:82⤵PID:628
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,44616155383443833,16191999359683728358,131072 --lang=en-US --disable-client-side-phishing-detection --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=14 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6220 /prefetch:12⤵PID:2636
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=renderer --field-trial-handle=2096,44616155383443833,16191999359683728358,131072 --lang=en-US --disable-client-side-phishing-detection --instant-process --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=15 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=6068 /prefetch:12⤵PID:4780
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=quarantine.mojom.Quarantine --field-trial-handle=2096,44616155383443833,16191999359683728358,131072 --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=5932 /prefetch:82⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680
-
-
C:\Users\Admin\Downloads\Loader.exe"C:\Users\Admin\Downloads\Loader.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:4476 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1632
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:432
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:1192
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:2764
-
C:\Users\Admin\Downloads\Loader.exe"C:\Users\Admin\Downloads\Loader.exe"1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1888 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:364 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4904 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4048 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:948 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4736 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1580 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2288 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3140 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3104 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1096 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2088 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:432 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3868 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3100 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:472 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3700 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe18⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2104 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4708 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2596 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1324 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4428 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1076 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4648 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4716 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2736 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe28⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1344 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4592 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2404 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:660 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4544 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe33⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4676 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe34⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4980 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe35⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2136 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe36⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe37⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3068 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe38⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2944 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe39⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4272 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe40⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3968 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe41⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4436 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe42⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:976 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe43⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3368 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe44⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:728 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe45⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1092 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe46⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4844 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe47⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1032 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe48⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1356 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe49⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1432 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe50⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3192 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe51⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3556 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe52⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2704 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe53⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3544 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe54⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5080 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe55⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2804 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe56⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2928 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe57⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:220 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe58⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3716 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe59⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1652 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe60⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3680 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe61⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe62⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4356 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe63⤵
- Executes dropped EXE
PID:4744 -
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe64⤵PID:644
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe65⤵PID:3820
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe66⤵PID:4072
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe67⤵PID:4792
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe68⤵PID:1492
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe69⤵PID:4584
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe70⤵PID:2300
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe71⤵PID:1876
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe72⤵PID:224
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe73⤵PID:3520
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe74⤵PID:4536
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe75⤵PID:2016
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe76⤵PID:4572
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe77⤵PID:2244
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe78⤵PID:1532
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe79⤵PID:2960
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe80⤵PID:3232
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe81⤵PID:3636
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe82⤵PID:4596
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe83⤵PID:3284
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe84⤵PID:5136
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe85⤵PID:5156
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe86⤵PID:5176
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe87⤵PID:5196
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe88⤵PID:5216
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe89⤵PID:5236
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe90⤵PID:5256
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe91⤵PID:5276
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe92⤵PID:5296
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe93⤵PID:5316
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe94⤵PID:5336
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe95⤵PID:5356
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe96⤵PID:5376
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe97⤵PID:5396
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe98⤵PID:5416
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe99⤵PID:5440
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe100⤵PID:5460
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe101⤵PID:5480
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe102⤵PID:5500
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe103⤵PID:5524
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe104⤵PID:5544
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe105⤵PID:5564
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe106⤵PID:5588
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe107⤵PID:5608
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe108⤵PID:5628
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe109⤵PID:5652
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe110⤵PID:5676
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe111⤵PID:5696
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe112⤵PID:5716
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe113⤵PID:5736
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe114⤵PID:5756
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe115⤵PID:5776
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe116⤵PID:5796
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe117⤵PID:5816
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe118⤵PID:5836
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe119⤵PID:5860
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe120⤵PID:5880
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe121⤵PID:5900
-
C:\Users\Admin\Downloads\Loader.exeC:\Users\Admin\Downloads\Loader.exe122⤵PID:5920
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-