Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
31/08/2024, 01:24
Static task
static1
Behavioral task
behavioral1
Sample
52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384.exe
Resource
win10v2004-20240802-en
General
-
Target
52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384.exe
-
Size
1.2MB
-
MD5
354b34a3694e2b4d54ba3bca624aa3c3
-
SHA1
660ee183f7f7a17eace0556c8883a2c361424cb0
-
SHA256
52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384
-
SHA512
f78bbbd45ee9dc147394f79c0aed2c8104c42116b72c653586ac0855d0c075e3b17571bc62e33ba055bcc91197f6e2a491e97ad35eab8f425bbf713a5e0b5870
-
SSDEEP
24576:+tb20pkaCqT5TBWgNQ7aLHWD2rmiOWlcIqDBZLAkxy06A:rVg5tQ7aLHWDd/B9A65
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\dddddd.vbs dddddd.exe -
Executes dropped EXE 64 IoCs
pid Process 2804 dddddd.exe 2404 dddddd.exe 2636 dddddd.exe 2584 dddddd.exe 1372 dddddd.exe 2880 dddddd.exe 2468 dddddd.exe 1996 dddddd.exe 1932 dddddd.exe 2848 dddddd.exe 1284 dddddd.exe 3064 dddddd.exe 2432 dddddd.exe 2216 dddddd.exe 1488 dddddd.exe 2464 dddddd.exe 1668 dddddd.exe 1648 dddddd.exe 952 dddddd.exe 2516 dddddd.exe 2252 dddddd.exe 892 dddddd.exe 1588 dddddd.exe 2724 dddddd.exe 2744 dddddd.exe 2796 dddddd.exe 2976 dddddd.exe 592 dddddd.exe 1096 dddddd.exe 1856 dddddd.exe 1624 dddddd.exe 2420 dddddd.exe 1808 dddddd.exe 1600 dddddd.exe 2660 dddddd.exe 2928 dddddd.exe 2428 dddddd.exe 2532 dddddd.exe 304 dddddd.exe 1140 dddddd.exe 860 dddddd.exe 864 dddddd.exe 1712 dddddd.exe 1988 dddddd.exe 2524 dddddd.exe 1736 dddddd.exe 2124 dddddd.exe 1556 dddddd.exe 2696 dddddd.exe 2576 dddddd.exe 2624 dddddd.exe 3056 dddddd.exe 1920 dddddd.exe 780 dddddd.exe 1044 dddddd.exe 1952 dddddd.exe 1564 dddddd.exe 1048 dddddd.exe 1452 dddddd.exe 316 dddddd.exe 2228 dddddd.exe 1496 dddddd.exe 716 dddddd.exe 2380 dddddd.exe -
Loads dropped DLL 1 IoCs
pid Process 2720 52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x00070000000156b2-13.dat autoit_exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dddddd.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2720 52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384.exe 2720 52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384.exe 2804 dddddd.exe 2804 dddddd.exe 2404 dddddd.exe 2404 dddddd.exe 2636 dddddd.exe 2636 dddddd.exe 2584 dddddd.exe 2584 dddddd.exe 1372 dddddd.exe 1372 dddddd.exe 2880 dddddd.exe 2880 dddddd.exe 2468 dddddd.exe 2468 dddddd.exe 1996 dddddd.exe 1996 dddddd.exe 1932 dddddd.exe 1932 dddddd.exe 2848 dddddd.exe 2848 dddddd.exe 1284 dddddd.exe 1284 dddddd.exe 3064 dddddd.exe 3064 dddddd.exe 2432 dddddd.exe 2432 dddddd.exe 2216 dddddd.exe 2216 dddddd.exe 1488 dddddd.exe 1488 dddddd.exe 2464 dddddd.exe 2464 dddddd.exe 1668 dddddd.exe 1668 dddddd.exe 1648 dddddd.exe 1648 dddddd.exe 952 dddddd.exe 952 dddddd.exe 2516 dddddd.exe 2516 dddddd.exe 2252 dddddd.exe 2252 dddddd.exe 892 dddddd.exe 892 dddddd.exe 1588 dddddd.exe 1588 dddddd.exe 2724 dddddd.exe 2724 dddddd.exe 2744 dddddd.exe 2744 dddddd.exe 2796 dddddd.exe 2796 dddddd.exe 2976 dddddd.exe 2976 dddddd.exe 592 dddddd.exe 592 dddddd.exe 1096 dddddd.exe 1096 dddddd.exe 1856 dddddd.exe 1856 dddddd.exe 1624 dddddd.exe 1624 dddddd.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2720 52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384.exe 2720 52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384.exe 2804 dddddd.exe 2804 dddddd.exe 2404 dddddd.exe 2404 dddddd.exe 2636 dddddd.exe 2636 dddddd.exe 2584 dddddd.exe 2584 dddddd.exe 1372 dddddd.exe 1372 dddddd.exe 2880 dddddd.exe 2880 dddddd.exe 2468 dddddd.exe 2468 dddddd.exe 1996 dddddd.exe 1996 dddddd.exe 1932 dddddd.exe 1932 dddddd.exe 2848 dddddd.exe 2848 dddddd.exe 1284 dddddd.exe 1284 dddddd.exe 3064 dddddd.exe 3064 dddddd.exe 2432 dddddd.exe 2432 dddddd.exe 2216 dddddd.exe 2216 dddddd.exe 1488 dddddd.exe 1488 dddddd.exe 2464 dddddd.exe 2464 dddddd.exe 1668 dddddd.exe 1668 dddddd.exe 1648 dddddd.exe 1648 dddddd.exe 952 dddddd.exe 952 dddddd.exe 2516 dddddd.exe 2516 dddddd.exe 2252 dddddd.exe 2252 dddddd.exe 892 dddddd.exe 892 dddddd.exe 1588 dddddd.exe 1588 dddddd.exe 2724 dddddd.exe 2724 dddddd.exe 2744 dddddd.exe 2744 dddddd.exe 2796 dddddd.exe 2796 dddddd.exe 2976 dddddd.exe 2976 dddddd.exe 592 dddddd.exe 592 dddddd.exe 1096 dddddd.exe 1096 dddddd.exe 1856 dddddd.exe 1856 dddddd.exe 1624 dddddd.exe 1624 dddddd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2720 wrote to memory of 2804 2720 52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384.exe 30 PID 2720 wrote to memory of 2804 2720 52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384.exe 30 PID 2720 wrote to memory of 2804 2720 52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384.exe 30 PID 2720 wrote to memory of 2804 2720 52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384.exe 30 PID 2804 wrote to memory of 2404 2804 dddddd.exe 31 PID 2804 wrote to memory of 2404 2804 dddddd.exe 31 PID 2804 wrote to memory of 2404 2804 dddddd.exe 31 PID 2804 wrote to memory of 2404 2804 dddddd.exe 31 PID 2404 wrote to memory of 2636 2404 dddddd.exe 32 PID 2404 wrote to memory of 2636 2404 dddddd.exe 32 PID 2404 wrote to memory of 2636 2404 dddddd.exe 32 PID 2404 wrote to memory of 2636 2404 dddddd.exe 32 PID 2636 wrote to memory of 2584 2636 dddddd.exe 33 PID 2636 wrote to memory of 2584 2636 dddddd.exe 33 PID 2636 wrote to memory of 2584 2636 dddddd.exe 33 PID 2636 wrote to memory of 2584 2636 dddddd.exe 33 PID 2584 wrote to memory of 1372 2584 dddddd.exe 34 PID 2584 wrote to memory of 1372 2584 dddddd.exe 34 PID 2584 wrote to memory of 1372 2584 dddddd.exe 34 PID 2584 wrote to memory of 1372 2584 dddddd.exe 34 PID 1372 wrote to memory of 2880 1372 dddddd.exe 35 PID 1372 wrote to memory of 2880 1372 dddddd.exe 35 PID 1372 wrote to memory of 2880 1372 dddddd.exe 35 PID 1372 wrote to memory of 2880 1372 dddddd.exe 35 PID 2880 wrote to memory of 2468 2880 dddddd.exe 36 PID 2880 wrote to memory of 2468 2880 dddddd.exe 36 PID 2880 wrote to memory of 2468 2880 dddddd.exe 36 PID 2880 wrote to memory of 2468 2880 dddddd.exe 36 PID 2468 wrote to memory of 1996 2468 dddddd.exe 37 PID 2468 wrote to memory of 1996 2468 dddddd.exe 37 PID 2468 wrote to memory of 1996 2468 dddddd.exe 37 PID 2468 wrote to memory of 1996 2468 dddddd.exe 37 PID 1996 wrote to memory of 1932 1996 dddddd.exe 38 PID 1996 wrote to memory of 1932 1996 dddddd.exe 38 PID 1996 wrote to memory of 1932 1996 dddddd.exe 38 PID 1996 wrote to memory of 1932 1996 dddddd.exe 38 PID 1932 wrote to memory of 2848 1932 dddddd.exe 39 PID 1932 wrote to memory of 2848 1932 dddddd.exe 39 PID 1932 wrote to memory of 2848 1932 dddddd.exe 39 PID 1932 wrote to memory of 2848 1932 dddddd.exe 39 PID 2848 wrote to memory of 1284 2848 dddddd.exe 40 PID 2848 wrote to memory of 1284 2848 dddddd.exe 40 PID 2848 wrote to memory of 1284 2848 dddddd.exe 40 PID 2848 wrote to memory of 1284 2848 dddddd.exe 40 PID 1284 wrote to memory of 3064 1284 dddddd.exe 41 PID 1284 wrote to memory of 3064 1284 dddddd.exe 41 PID 1284 wrote to memory of 3064 1284 dddddd.exe 41 PID 1284 wrote to memory of 3064 1284 dddddd.exe 41 PID 3064 wrote to memory of 2432 3064 dddddd.exe 42 PID 3064 wrote to memory of 2432 3064 dddddd.exe 42 PID 3064 wrote to memory of 2432 3064 dddddd.exe 42 PID 3064 wrote to memory of 2432 3064 dddddd.exe 42 PID 2432 wrote to memory of 2216 2432 dddddd.exe 43 PID 2432 wrote to memory of 2216 2432 dddddd.exe 43 PID 2432 wrote to memory of 2216 2432 dddddd.exe 43 PID 2432 wrote to memory of 2216 2432 dddddd.exe 43 PID 2216 wrote to memory of 1488 2216 dddddd.exe 44 PID 2216 wrote to memory of 1488 2216 dddddd.exe 44 PID 2216 wrote to memory of 1488 2216 dddddd.exe 44 PID 2216 wrote to memory of 1488 2216 dddddd.exe 44 PID 1488 wrote to memory of 2464 1488 dddddd.exe 45 PID 1488 wrote to memory of 2464 1488 dddddd.exe 45 PID 1488 wrote to memory of 2464 1488 dddddd.exe 45 PID 1488 wrote to memory of 2464 1488 dddddd.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384.exe"C:\Users\Admin\AppData\Local\Temp\52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384.exe"1⤵
- Loads dropped DLL
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\Temp\52e5414e2e8aabecfc1c38926a3d863e1ee26bef5dc8453fc0568d9f263cf384.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"3⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"5⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"6⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"7⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"11⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1284 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"13⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"14⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"16⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"17⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2464 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"18⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1668 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"19⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1648 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"20⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:952 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"21⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2516 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"22⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2252 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:892 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1588 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"25⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2724 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2744 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"27⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2796 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:2976 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:592 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"30⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1096 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1856 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"32⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1624 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"33⤵
- Executes dropped EXE
PID:2420 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"34⤵
- Executes dropped EXE
PID:1808 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"35⤵
- Executes dropped EXE
PID:1600 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"36⤵
- Executes dropped EXE
PID:2660 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"37⤵
- Executes dropped EXE
PID:2928 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"38⤵
- Executes dropped EXE
PID:2428 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"39⤵
- Executes dropped EXE
PID:2532 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:304 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1140 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"42⤵
- Executes dropped EXE
PID:860 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"43⤵
- Executes dropped EXE
PID:864 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"44⤵
- Executes dropped EXE
PID:1712 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1988 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"47⤵
- Executes dropped EXE
PID:1736 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"48⤵
- Executes dropped EXE
PID:2124 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"49⤵
- Executes dropped EXE
PID:1556 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"50⤵
- Executes dropped EXE
PID:2696 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"51⤵
- Executes dropped EXE
PID:2576 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"52⤵
- Executes dropped EXE
PID:2624 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"53⤵
- Executes dropped EXE
PID:3056 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"54⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"55⤵
- Executes dropped EXE
PID:780 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"56⤵
- Executes dropped EXE
PID:1044 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1952 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"58⤵
- Executes dropped EXE
PID:1564 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"60⤵
- Executes dropped EXE
PID:1452 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"61⤵
- Executes dropped EXE
PID:316 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"62⤵
- Executes dropped EXE
PID:2228 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"63⤵
- Executes dropped EXE
PID:1496 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:716 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"65⤵
- Executes dropped EXE
PID:2380 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"66⤵PID:1928
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"67⤵PID:2372
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"68⤵PID:3008
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"69⤵PID:1628
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"70⤵PID:2776
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"71⤵PID:2764
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"72⤵PID:2820
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"73⤵PID:332
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"74⤵
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"75⤵PID:2180
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"76⤵PID:2008
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"77⤵PID:1268
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"78⤵PID:2016
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"79⤵
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"80⤵PID:2312
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"81⤵
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"82⤵PID:840
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"83⤵PID:1868
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"84⤵PID:912
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"85⤵PID:2068
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"86⤵PID:1272
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"87⤵PID:2784
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"88⤵PID:2240
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"89⤵PID:2600
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"90⤵PID:1012
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"91⤵
- System Location Discovery: System Language Discovery
PID:2876 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"92⤵
- System Location Discovery: System Language Discovery
PID:792 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"93⤵PID:2112
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"94⤵PID:2712
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"95⤵
- System Location Discovery: System Language Discovery
PID:276 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"96⤵PID:3044
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"97⤵PID:2920
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"98⤵PID:3068
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"99⤵PID:1112
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"100⤵PID:856
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"101⤵PID:1064
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"102⤵PID:2256
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"103⤵PID:2900
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"104⤵PID:1672
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"105⤵
- System Location Discovery: System Language Discovery
PID:1652 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"106⤵PID:2108
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"107⤵
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"108⤵PID:1912
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"109⤵PID:1204
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"110⤵PID:2844
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"111⤵
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"112⤵PID:3024
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"113⤵PID:1388
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"114⤵PID:3032
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"115⤵PID:2476
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"116⤵PID:2808
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"117⤵PID:2864
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"118⤵PID:1060
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"119⤵PID:2412
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"120⤵PID:2352
-
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"121⤵
- System Location Discovery: System Language Discovery
PID:272 -
C:\Users\Admin\AppData\Local\directory\dddddd.exe"C:\Users\Admin\AppData\Local\directory\dddddd.exe"122⤵PID:2088
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-