Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 10:39
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
csrss.exe
Resource
win7-20240729-en
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
csrss.exe
Resource
win10v2004-20240802-en
8 signatures
150 seconds
General
-
Target
csrss.exe
-
Size
1.2MB
-
MD5
354b34a3694e2b4d54ba3bca624aa3c3
-
SHA1
660ee183f7f7a17eace0556c8883a2c361424cb0
-
SHA256
52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384
-
SHA512
f78bbbd45ee9dc147394f79c0aed2c8104c42116b72c653586ac0855d0c075e3b17571bc62e33ba055bcc91197f6e2a491e97ad35eab8f425bbf713a5e0b5870
-
SSDEEP
24576:+tb20pkaCqT5TBWgNQ7aLHWD2rmiOWlcIqDBZLAkxy06A:rVg5tQ7aLHWDd/B9A65
Score
7/10
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dddddd.vbs dddddd.exe -
Executes dropped EXE 64 IoCs
pid Process 2900 dddddd.exe 2832 dddddd.exe 2896 dddddd.exe 2792 dddddd.exe 2636 dddddd.exe 2544 dddddd.exe 2876 dddddd.exe 816 dddddd.exe 2604 dddddd.exe 2980 dddddd.exe 2332 dddddd.exe 2100 dddddd.exe 2596 dddddd.exe 2484 dddddd.exe 1908 dddddd.exe 1092 dddddd.exe 1616 dddddd.exe 1524 dddddd.exe 600 dddddd.exe 2196 dddddd.exe 2104 dddddd.exe 740 dddddd.exe 2556 dddddd.exe 3032 dddddd.exe 2768 dddddd.exe 2860 dddddd.exe 2652 dddddd.exe 2808 dddddd.exe 2740 dddddd.exe 1520 dddddd.exe 2220 dddddd.exe 2084 dddddd.exe 1456 dddddd.exe 2928 dddddd.exe 3048 dddddd.exe 2948 dddddd.exe 2600 dddddd.exe 820 dddddd.exe 2092 dddddd.exe 920 dddddd.exe 1792 dddddd.exe 2400 dddddd.exe 284 dddddd.exe 2028 dddddd.exe 1236 dddddd.exe 788 dddddd.exe 1084 dddddd.exe 1064 dddddd.exe 1548 dddddd.exe 2812 dddddd.exe 2772 dddddd.exe 3004 dddddd.exe 2680 dddddd.exe 916 dddddd.exe 1712 dddddd.exe 1260 dddddd.exe 2880 dddddd.exe 3000 dddddd.exe 1404 dddddd.exe 2976 dddddd.exe 812 dddddd.exe 2164 dddddd.exe 1988 dddddd.exe 1784 dddddd.exe -
Loads dropped DLL 2 IoCs
pid Process 1752 csrss.exe 2900 dddddd.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x0007000000019396-13.dat autoit_exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1752 csrss.exe 1752 csrss.exe 2900 dddddd.exe 2900 dddddd.exe 2832 dddddd.exe 2832 dddddd.exe 2896 dddddd.exe 2896 dddddd.exe 2792 dddddd.exe 2792 dddddd.exe 2636 dddddd.exe 2636 dddddd.exe 2544 dddddd.exe 2544 dddddd.exe 2876 dddddd.exe 2876 dddddd.exe 816 dddddd.exe 816 dddddd.exe 2604 dddddd.exe 2604 dddddd.exe 2980 dddddd.exe 2980 dddddd.exe 2332 dddddd.exe 2332 dddddd.exe 2100 dddddd.exe 2100 dddddd.exe 2596 dddddd.exe 2596 dddddd.exe 2484 dddddd.exe 2484 dddddd.exe 1908 dddddd.exe 1908 dddddd.exe 1092 dddddd.exe 1092 dddddd.exe 1616 dddddd.exe 1616 dddddd.exe 1524 dddddd.exe 1524 dddddd.exe 600 dddddd.exe 600 dddddd.exe 2196 dddddd.exe 2196 dddddd.exe 2104 dddddd.exe 2104 dddddd.exe 740 dddddd.exe 740 dddddd.exe 2556 dddddd.exe 2556 dddddd.exe 3032 dddddd.exe 3032 dddddd.exe 2768 dddddd.exe 2768 dddddd.exe 2860 dddddd.exe 2860 dddddd.exe 2652 dddddd.exe 2652 dddddd.exe 2808 dddddd.exe 2808 dddddd.exe 2740 dddddd.exe 2740 dddddd.exe 1520 dddddd.exe 1520 dddddd.exe 2220 dddddd.exe 2220 dddddd.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 1752 csrss.exe 1752 csrss.exe 2900 dddddd.exe 2900 dddddd.exe 2832 dddddd.exe 2832 dddddd.exe 2896 dddddd.exe 2896 dddddd.exe 2792 dddddd.exe 2792 dddddd.exe 2636 dddddd.exe 2636 dddddd.exe 2544 dddddd.exe 2544 dddddd.exe 2876 dddddd.exe 2876 dddddd.exe 816 dddddd.exe 816 dddddd.exe 2604 dddddd.exe 2604 dddddd.exe 2980 dddddd.exe 2980 dddddd.exe 2332 dddddd.exe 2332 dddddd.exe 2100 dddddd.exe 2100 dddddd.exe 2596 dddddd.exe 2596 dddddd.exe 2484 dddddd.exe 2484 dddddd.exe 1908 dddddd.exe 1908 dddddd.exe 1092 dddddd.exe 1092 dddddd.exe 1616 dddddd.exe 1616 dddddd.exe 1524 dddddd.exe 1524 dddddd.exe 600 dddddd.exe 600 dddddd.exe 2196 dddddd.exe 2196 dddddd.exe 2104 dddddd.exe 2104 dddddd.exe 740 dddddd.exe 740 dddddd.exe 2556 dddddd.exe 2556 dddddd.exe 3032 dddddd.exe 3032 dddddd.exe 2768 dddddd.exe 2768 dddddd.exe 2860 dddddd.exe 2860 dddddd.exe 2652 dddddd.exe 2652 dddddd.exe 2808 dddddd.exe 2808 dddddd.exe 2740 dddddd.exe 2740 dddddd.exe 1520 dddddd.exe 1520 dddddd.exe 2220 dddddd.exe 2220 dddddd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1752 wrote to memory of 2900 1752 csrss.exe 30 PID 1752 wrote to memory of 2900 1752 csrss.exe 30 PID 1752 wrote to memory of 2900 1752 csrss.exe 30 PID 1752 wrote to memory of 2900 1752 csrss.exe 30 PID 2900 wrote to memory of 2832 2900 dddddd.exe 31 PID 2900 wrote to memory of 2832 2900 dddddd.exe 31 PID 2900 wrote to memory of 2832 2900 dddddd.exe 31 PID 2900 wrote to memory of 2832 2900 dddddd.exe 31 PID 2832 wrote to memory of 2896 2832 dddddd.exe 32 PID 2832 wrote to memory of 2896 2832 dddddd.exe 32 PID 2832 wrote to memory of 2896 2832 dddddd.exe 32 PID 2832 wrote to memory of 2896 2832 dddddd.exe 32 PID 2896 wrote to memory of 2792 2896 dddddd.exe 33 PID 2896 wrote to memory of 2792 2896 dddddd.exe 33 PID 2896 wrote to memory of 2792 2896 dddddd.exe 33 PID 2896 wrote to memory of 2792 2896 dddddd.exe 33 PID 2792 wrote to memory of 2636 2792 dddddd.exe 34 PID 2792 wrote to memory of 2636 2792 dddddd.exe 34 PID 2792 wrote to memory of 2636 2792 dddddd.exe 34 PID 2792 wrote to memory of 2636 2792 dddddd.exe 34 PID 2636 wrote to memory of 2544 2636 dddddd.exe 35 PID 2636 wrote to memory of 2544 2636 dddddd.exe 35 PID 2636 wrote to memory of 2544 2636 dddddd.exe 35 PID 2636 wrote to memory of 2544 2636 dddddd.exe 35 PID 2544 wrote to memory of 2876 2544 dddddd.exe 36 PID 2544 wrote to memory of 2876 2544 dddddd.exe 36 PID 2544 wrote to memory of 2876 2544 dddddd.exe 36 PID 2544 wrote to memory of 2876 2544 dddddd.exe 36 PID 2876 wrote to memory of 816 2876 dddddd.exe 37 PID 2876 wrote to memory of 816 2876 dddddd.exe 37 PID 2876 wrote to memory of 816 2876 dddddd.exe 37 PID 2876 wrote to memory of 816 2876 dddddd.exe 37 PID 816 wrote to memory of 2604 816 dddddd.exe 38 PID 816 wrote to memory of 2604 816 dddddd.exe 38 PID 816 wrote to memory of 2604 816 dddddd.exe 38 PID 816 wrote to memory of 2604 816 dddddd.exe 38 PID 2604 wrote to memory of 2980 2604 dddddd.exe 39 PID 2604 wrote to memory of 2980 2604 dddddd.exe 39 PID 2604 wrote to memory of 2980 2604 dddddd.exe 39 PID 2604 wrote to memory of 2980 2604 dddddd.exe 39 PID 2980 wrote to memory of 2332 2980 dddddd.exe 40 PID 2980 wrote to memory of 2332 2980 dddddd.exe 40 PID 2980 wrote to memory of 2332 2980 dddddd.exe 40 PID 2980 wrote to memory of 2332 2980 dddddd.exe 40 PID 2332 wrote to memory of 2100 2332 dddddd.exe 41 PID 2332 wrote to memory of 2100 2332 dddddd.exe 41 PID 2332 wrote to memory of 2100 2332 dddddd.exe 41 PID 2332 wrote to memory of 2100 2332 dddddd.exe 41 PID 2100 wrote to memory of 2596 2100 dddddd.exe 42 PID 2100 wrote to memory of 2596 2100 dddddd.exe 42 PID 2100 wrote to memory of 2596 2100 dddddd.exe 42 PID 2100 wrote to memory of 2596 2100 dddddd.exe 42 PID 2596 wrote to memory of 2484 2596 dddddd.exe 43 PID 2596 wrote to memory of 2484 2596 dddddd.exe 43 PID 2596 wrote to memory of 2484 2596 dddddd.exe 43 PID 2596 wrote to memory of 2484 2596 dddddd.exe 43 PID 2484 wrote to memory of 1908 2484 dddddd.exe 44 PID 2484 wrote to memory of 1908 2484 dddddd.exe 44 PID 2484 wrote to memory of 1908 2484 dddddd.exe 44 PID 2484 wrote to memory of 1908 2484 dddddd.exe 44 PID 1908 wrote to memory of 1092 1908 dddddd.exe 45 PID 1908 wrote to memory of 1092 1908 dddddd.exe 45 PID 1908 wrote to memory of 1092 1908 dddddd.exe 45 PID 1908 wrote to memory of 1092 1908 dddddd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\csrss.exe"C:\Users\Admin\AppData\Local\Temp\csrss.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\Temp\csrss.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"4⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"7⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"8⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"9⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"10⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"15⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"17⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1092 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"18⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1616 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"19⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1524 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"20⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:600 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"21⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2196 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"22⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2104 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"23⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:740 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"24⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2556 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"25⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3032 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2768 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"27⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2860 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"28⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2652 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"29⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2808 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2740 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"31⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1520 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"32⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2220 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"33⤵
- Executes dropped EXE
PID:2084 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"34⤵
- Executes dropped EXE
PID:1456 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"35⤵
- Executes dropped EXE
PID:2928 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"36⤵
- Executes dropped EXE
PID:3048 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"37⤵
- Executes dropped EXE
PID:2948 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"38⤵
- Executes dropped EXE
PID:2600 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"39⤵
- Executes dropped EXE
PID:820 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"40⤵
- Executes dropped EXE
PID:2092 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"41⤵
- Executes dropped EXE
PID:920 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"43⤵
- Executes dropped EXE
PID:2400 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"44⤵
- Executes dropped EXE
PID:284 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"45⤵
- Executes dropped EXE
PID:2028 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"46⤵
- Executes dropped EXE
PID:1236 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"47⤵
- Executes dropped EXE
PID:788 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"48⤵
- Executes dropped EXE
PID:1084 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"49⤵
- Executes dropped EXE
PID:1064 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"50⤵
- Executes dropped EXE
PID:1548 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"52⤵
- Executes dropped EXE
PID:2772 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"53⤵
- Executes dropped EXE
PID:3004 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"54⤵
- Executes dropped EXE
PID:2680 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:916 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"56⤵
- Executes dropped EXE
PID:1712 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"57⤵
- Executes dropped EXE
PID:1260 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"58⤵
- Executes dropped EXE
PID:2880 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"59⤵
- Executes dropped EXE
PID:3000 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"60⤵
- Executes dropped EXE
PID:1404 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"61⤵
- Executes dropped EXE
PID:2976 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:812 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"63⤵
- Executes dropped EXE
PID:2164 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1988 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"66⤵PID:2184
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"67⤵PID:1044
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"68⤵PID:1216
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"69⤵PID:1448
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"70⤵PID:448
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"71⤵PID:1976
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"72⤵PID:2136
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"73⤵PID:2776
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"74⤵
- System Location Discovery: System Language Discovery
PID:2640 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"75⤵PID:2632
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"76⤵
- System Location Discovery: System Language Discovery
PID:332 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"77⤵PID:1676
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"78⤵PID:3040
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"79⤵PID:2848
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"80⤵PID:2952
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"81⤵PID:1944
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"82⤵PID:556
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"83⤵PID:2424
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"84⤵
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"85⤵PID:2124
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"86⤵PID:1756
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"87⤵PID:1048
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"88⤵PID:1912
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"89⤵
- System Location Discovery: System Language Discovery
PID:2120 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"90⤵PID:2160
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"91⤵PID:2868
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"92⤵PID:2764
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"93⤵PID:1640
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"94⤵
- System Location Discovery: System Language Discovery
PID:1828 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"95⤵PID:2704
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"96⤵PID:2936
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"97⤵PID:572
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"98⤵PID:2248
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"99⤵PID:2156
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"100⤵PID:2456
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"101⤵PID:1032
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"102⤵PID:892
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"103⤵
- System Location Discovery: System Language Discovery
PID:1484 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"104⤵PID:2240
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"105⤵PID:1684
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"106⤵PID:2128
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"107⤵PID:1580
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"108⤵PID:2656
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"109⤵
- System Location Discovery: System Language Discovery
PID:2132 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"110⤵PID:2920
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"111⤵PID:2580
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"112⤵PID:1948
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"113⤵PID:2096
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"114⤵
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"115⤵
- System Location Discovery: System Language Discovery
PID:984 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"116⤵PID:2056
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"117⤵PID:1488
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"118⤵PID:1480
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"119⤵
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"120⤵PID:2644
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"121⤵PID:652
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"122⤵PID:1552
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-