Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
119s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/09/2024, 04:44
Static task
static1
Behavioral task
behavioral1
Sample
dd14679ecda3a154ce242450cf4ebf90N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
dd14679ecda3a154ce242450cf4ebf90N.exe
Resource
win10v2004-20240802-en
General
-
Target
dd14679ecda3a154ce242450cf4ebf90N.exe
-
Size
1023KB
-
MD5
dd14679ecda3a154ce242450cf4ebf90
-
SHA1
6ecc77095df9d5604e46542af827e1fcd2dae5c3
-
SHA256
7c2ed4a0bc46a8e348848d4062ff464bdda7344997159db0d07bcc16bb206f4d
-
SHA512
dc815ddc6b36f123705e0da3f36a087fe2824c9b8ad00e38c53adfaea89592387b20493b225744c4a45dd81897f9071d9e8cccbdd43aca398ee078e48be9aa26
-
SSDEEP
24576:1qylFH50Dv6RwyeQvt6ot0h9HyrOgiruAUE:IylFHUv6ReIt0jSrOr
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2804 V4EHZ.exe 2168 EUC6X.exe 2760 N76TE.exe 2572 FH469.exe 1920 E853K.exe 1336 E3PL8.exe 2188 3Y42L.exe 2272 W4W4U.exe 2564 MS5FC.exe 1760 4934P.exe 2892 B9CXY.exe 1944 41Y5C.exe 2952 9783J.exe 804 625HH.exe 1880 PF1AZ.exe 820 7H60V.exe 448 05D9M.exe 976 2Q0PN.exe 940 67593.exe 828 9KO73.exe 904 5L577.exe 2656 36B4Q.exe 2432 D0BRG.exe 868 6G6L0.exe 1564 GB1WH.exe 2932 X9QW4.exe 2708 T111Z.exe 2780 7YP9K.exe 2872 75Q63.exe 2596 K280E.exe 3012 23SX9.exe 844 L58H2.exe 644 298SU.exe 2292 2O7S5.exe 2800 06TOT.exe 1952 HI3H2.exe 2112 0QAKR.exe 2636 WWZ2P.exe 1604 541JN.exe 1988 8NBB7.exe 1972 XTUMA.exe 2220 447N2.exe 2108 Q8W19.exe 1000 N339N.exe 804 PH0L8.exe 1360 3X417.exe 872 C5CDN.exe 1752 79B41.exe 2280 7ZD2N.exe 940 O8OYX.exe 892 17ER8.exe 2524 8VEIN.exe 1540 G9U6C.exe 2064 OB5S7.exe 1676 W03C6.exe 2720 62QDF.exe 2160 327I8.exe 2736 1F98X.exe 2780 R9QB0.exe 2640 VFBC7.exe 2620 MIKEO.exe 1656 2HP02.exe 844 1QDUP.exe 2156 822D4.exe -
Loads dropped DLL 64 IoCs
pid Process 2160 dd14679ecda3a154ce242450cf4ebf90N.exe 2160 dd14679ecda3a154ce242450cf4ebf90N.exe 2804 V4EHZ.exe 2804 V4EHZ.exe 2168 EUC6X.exe 2168 EUC6X.exe 2760 N76TE.exe 2760 N76TE.exe 2572 FH469.exe 2572 FH469.exe 1920 E853K.exe 1920 E853K.exe 1336 E3PL8.exe 1336 E3PL8.exe 2188 3Y42L.exe 2188 3Y42L.exe 2272 W4W4U.exe 2272 W4W4U.exe 2564 MS5FC.exe 2564 MS5FC.exe 1760 4934P.exe 1760 4934P.exe 2892 B9CXY.exe 2892 B9CXY.exe 1944 41Y5C.exe 1944 41Y5C.exe 2952 9783J.exe 2952 9783J.exe 804 625HH.exe 804 625HH.exe 1880 PF1AZ.exe 1880 PF1AZ.exe 820 7H60V.exe 820 7H60V.exe 448 05D9M.exe 448 05D9M.exe 976 2Q0PN.exe 976 2Q0PN.exe 940 67593.exe 940 67593.exe 828 9KO73.exe 828 9KO73.exe 904 5L577.exe 904 5L577.exe 2656 36B4Q.exe 2656 36B4Q.exe 2432 D0BRG.exe 2432 D0BRG.exe 868 6G6L0.exe 868 6G6L0.exe 1564 GB1WH.exe 1564 GB1WH.exe 2932 X9QW4.exe 2932 X9QW4.exe 2708 T111Z.exe 2708 T111Z.exe 2780 7YP9K.exe 2780 7YP9K.exe 2872 75Q63.exe 2872 75Q63.exe 2596 K280E.exe 2596 K280E.exe 3012 23SX9.exe 3012 23SX9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language B13PD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63PIL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30A8J.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IHX4Z.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 01CSN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1BL2V.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 834B8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 295RF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 757HS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 673HW.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8E3EZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language K57PH.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9SWF2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PH0L8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12P1R.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17BPJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FFML1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 564FZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 374FS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 30SAD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1I5V7.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5J70Q.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language T9244.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GWP46.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W9P04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06TOT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 21060.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KL9ZE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language L897D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VZ6YB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0461J.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language U69B1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W03C6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9Z1FN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language O5202.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 298SU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language E5L49.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language W6LZ6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 930H8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 17ER8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AN1MJ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81P07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44LKO.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LNFJR.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2BZGS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61Z95.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ER7VZ.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 95PIY.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language F59Z2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 000XB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QM15J.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 99N7C.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5C30D.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 983JG.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 69R31.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LD347.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3Y42L.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ORR37.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 06RR8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language KL3F8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language GJ3UI.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 66V5M.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 86084.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2160 dd14679ecda3a154ce242450cf4ebf90N.exe 2160 dd14679ecda3a154ce242450cf4ebf90N.exe 2804 V4EHZ.exe 2804 V4EHZ.exe 2168 EUC6X.exe 2168 EUC6X.exe 2760 N76TE.exe 2760 N76TE.exe 2572 FH469.exe 2572 FH469.exe 1920 E853K.exe 1920 E853K.exe 1336 E3PL8.exe 1336 E3PL8.exe 2188 3Y42L.exe 2188 3Y42L.exe 2272 W4W4U.exe 2272 W4W4U.exe 2564 MS5FC.exe 2564 MS5FC.exe 1760 4934P.exe 1760 4934P.exe 2892 B9CXY.exe 2892 B9CXY.exe 1944 41Y5C.exe 1944 41Y5C.exe 2952 9783J.exe 2952 9783J.exe 804 625HH.exe 804 625HH.exe 1880 PF1AZ.exe 1880 PF1AZ.exe 820 7H60V.exe 820 7H60V.exe 448 05D9M.exe 448 05D9M.exe 976 2Q0PN.exe 976 2Q0PN.exe 940 67593.exe 940 67593.exe 828 9KO73.exe 828 9KO73.exe 904 5L577.exe 904 5L577.exe 2656 36B4Q.exe 2656 36B4Q.exe 2432 D0BRG.exe 2432 D0BRG.exe 868 6G6L0.exe 868 6G6L0.exe 1564 GB1WH.exe 1564 GB1WH.exe 2932 X9QW4.exe 2932 X9QW4.exe 2708 T111Z.exe 2708 T111Z.exe 2780 7YP9K.exe 2780 7YP9K.exe 2872 75Q63.exe 2872 75Q63.exe 2596 K280E.exe 2596 K280E.exe 3012 23SX9.exe 3012 23SX9.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2804 2160 dd14679ecda3a154ce242450cf4ebf90N.exe 30 PID 2160 wrote to memory of 2804 2160 dd14679ecda3a154ce242450cf4ebf90N.exe 30 PID 2160 wrote to memory of 2804 2160 dd14679ecda3a154ce242450cf4ebf90N.exe 30 PID 2160 wrote to memory of 2804 2160 dd14679ecda3a154ce242450cf4ebf90N.exe 30 PID 2804 wrote to memory of 2168 2804 V4EHZ.exe 31 PID 2804 wrote to memory of 2168 2804 V4EHZ.exe 31 PID 2804 wrote to memory of 2168 2804 V4EHZ.exe 31 PID 2804 wrote to memory of 2168 2804 V4EHZ.exe 31 PID 2168 wrote to memory of 2760 2168 EUC6X.exe 32 PID 2168 wrote to memory of 2760 2168 EUC6X.exe 32 PID 2168 wrote to memory of 2760 2168 EUC6X.exe 32 PID 2168 wrote to memory of 2760 2168 EUC6X.exe 32 PID 2760 wrote to memory of 2572 2760 N76TE.exe 33 PID 2760 wrote to memory of 2572 2760 N76TE.exe 33 PID 2760 wrote to memory of 2572 2760 N76TE.exe 33 PID 2760 wrote to memory of 2572 2760 N76TE.exe 33 PID 2572 wrote to memory of 1920 2572 FH469.exe 34 PID 2572 wrote to memory of 1920 2572 FH469.exe 34 PID 2572 wrote to memory of 1920 2572 FH469.exe 34 PID 2572 wrote to memory of 1920 2572 FH469.exe 34 PID 1920 wrote to memory of 1336 1920 E853K.exe 35 PID 1920 wrote to memory of 1336 1920 E853K.exe 35 PID 1920 wrote to memory of 1336 1920 E853K.exe 35 PID 1920 wrote to memory of 1336 1920 E853K.exe 35 PID 1336 wrote to memory of 2188 1336 E3PL8.exe 36 PID 1336 wrote to memory of 2188 1336 E3PL8.exe 36 PID 1336 wrote to memory of 2188 1336 E3PL8.exe 36 PID 1336 wrote to memory of 2188 1336 E3PL8.exe 36 PID 2188 wrote to memory of 2272 2188 3Y42L.exe 37 PID 2188 wrote to memory of 2272 2188 3Y42L.exe 37 PID 2188 wrote to memory of 2272 2188 3Y42L.exe 37 PID 2188 wrote to memory of 2272 2188 3Y42L.exe 37 PID 2272 wrote to memory of 2564 2272 W4W4U.exe 38 PID 2272 wrote to memory of 2564 2272 W4W4U.exe 38 PID 2272 wrote to memory of 2564 2272 W4W4U.exe 38 PID 2272 wrote to memory of 2564 2272 W4W4U.exe 38 PID 2564 wrote to memory of 1760 2564 MS5FC.exe 39 PID 2564 wrote to memory of 1760 2564 MS5FC.exe 39 PID 2564 wrote to memory of 1760 2564 MS5FC.exe 39 PID 2564 wrote to memory of 1760 2564 MS5FC.exe 39 PID 1760 wrote to memory of 2892 1760 4934P.exe 40 PID 1760 wrote to memory of 2892 1760 4934P.exe 40 PID 1760 wrote to memory of 2892 1760 4934P.exe 40 PID 1760 wrote to memory of 2892 1760 4934P.exe 40 PID 2892 wrote to memory of 1944 2892 B9CXY.exe 41 PID 2892 wrote to memory of 1944 2892 B9CXY.exe 41 PID 2892 wrote to memory of 1944 2892 B9CXY.exe 41 PID 2892 wrote to memory of 1944 2892 B9CXY.exe 41 PID 1944 wrote to memory of 2952 1944 41Y5C.exe 42 PID 1944 wrote to memory of 2952 1944 41Y5C.exe 42 PID 1944 wrote to memory of 2952 1944 41Y5C.exe 42 PID 1944 wrote to memory of 2952 1944 41Y5C.exe 42 PID 2952 wrote to memory of 804 2952 9783J.exe 43 PID 2952 wrote to memory of 804 2952 9783J.exe 43 PID 2952 wrote to memory of 804 2952 9783J.exe 43 PID 2952 wrote to memory of 804 2952 9783J.exe 43 PID 804 wrote to memory of 1880 804 625HH.exe 44 PID 804 wrote to memory of 1880 804 625HH.exe 44 PID 804 wrote to memory of 1880 804 625HH.exe 44 PID 804 wrote to memory of 1880 804 625HH.exe 44 PID 1880 wrote to memory of 820 1880 PF1AZ.exe 45 PID 1880 wrote to memory of 820 1880 PF1AZ.exe 45 PID 1880 wrote to memory of 820 1880 PF1AZ.exe 45 PID 1880 wrote to memory of 820 1880 PF1AZ.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd14679ecda3a154ce242450cf4ebf90N.exe"C:\Users\Admin\AppData\Local\Temp\dd14679ecda3a154ce242450cf4ebf90N.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\V4EHZ.exe"C:\Users\Admin\AppData\Local\Temp\V4EHZ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\EUC6X.exe"C:\Users\Admin\AppData\Local\Temp\EUC6X.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\N76TE.exe"C:\Users\Admin\AppData\Local\Temp\N76TE.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\FH469.exe"C:\Users\Admin\AppData\Local\Temp\FH469.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\E853K.exe"C:\Users\Admin\AppData\Local\Temp\E853K.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\E3PL8.exe"C:\Users\Admin\AppData\Local\Temp\E3PL8.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\3Y42L.exe"C:\Users\Admin\AppData\Local\Temp\3Y42L.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\W4W4U.exe"C:\Users\Admin\AppData\Local\Temp\W4W4U.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\MS5FC.exe"C:\Users\Admin\AppData\Local\Temp\MS5FC.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\4934P.exe"C:\Users\Admin\AppData\Local\Temp\4934P.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\B9CXY.exe"C:\Users\Admin\AppData\Local\Temp\B9CXY.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\41Y5C.exe"C:\Users\Admin\AppData\Local\Temp\41Y5C.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\9783J.exe"C:\Users\Admin\AppData\Local\Temp\9783J.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\625HH.exe"C:\Users\Admin\AppData\Local\Temp\625HH.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Local\Temp\PF1AZ.exe"C:\Users\Admin\AppData\Local\Temp\PF1AZ.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\7H60V.exe"C:\Users\Admin\AppData\Local\Temp\7H60V.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:820 -
C:\Users\Admin\AppData\Local\Temp\05D9M.exe"C:\Users\Admin\AppData\Local\Temp\05D9M.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:448 -
C:\Users\Admin\AppData\Local\Temp\2Q0PN.exe"C:\Users\Admin\AppData\Local\Temp\2Q0PN.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:976 -
C:\Users\Admin\AppData\Local\Temp\67593.exe"C:\Users\Admin\AppData\Local\Temp\67593.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:940 -
C:\Users\Admin\AppData\Local\Temp\9KO73.exe"C:\Users\Admin\AppData\Local\Temp\9KO73.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:828 -
C:\Users\Admin\AppData\Local\Temp\5L577.exe"C:\Users\Admin\AppData\Local\Temp\5L577.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:904 -
C:\Users\Admin\AppData\Local\Temp\36B4Q.exe"C:\Users\Admin\AppData\Local\Temp\36B4Q.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\D0BRG.exe"C:\Users\Admin\AppData\Local\Temp\D0BRG.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\6G6L0.exe"C:\Users\Admin\AppData\Local\Temp\6G6L0.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:868 -
C:\Users\Admin\AppData\Local\Temp\GB1WH.exe"C:\Users\Admin\AppData\Local\Temp\GB1WH.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\X9QW4.exe"C:\Users\Admin\AppData\Local\Temp\X9QW4.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\T111Z.exe"C:\Users\Admin\AppData\Local\Temp\T111Z.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\7YP9K.exe"C:\Users\Admin\AppData\Local\Temp\7YP9K.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\75Q63.exe"C:\Users\Admin\AppData\Local\Temp\75Q63.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\K280E.exe"C:\Users\Admin\AppData\Local\Temp\K280E.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\23SX9.exe"C:\Users\Admin\AppData\Local\Temp\23SX9.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\L58H2.exe"C:\Users\Admin\AppData\Local\Temp\L58H2.exe"33⤵
- Executes dropped EXE
PID:844 -
C:\Users\Admin\AppData\Local\Temp\298SU.exe"C:\Users\Admin\AppData\Local\Temp\298SU.exe"34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:644 -
C:\Users\Admin\AppData\Local\Temp\2O7S5.exe"C:\Users\Admin\AppData\Local\Temp\2O7S5.exe"35⤵
- Executes dropped EXE
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\06TOT.exe"C:\Users\Admin\AppData\Local\Temp\06TOT.exe"36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\HI3H2.exe"C:\Users\Admin\AppData\Local\Temp\HI3H2.exe"37⤵
- Executes dropped EXE
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\0QAKR.exe"C:\Users\Admin\AppData\Local\Temp\0QAKR.exe"38⤵
- Executes dropped EXE
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\WWZ2P.exe"C:\Users\Admin\AppData\Local\Temp\WWZ2P.exe"39⤵
- Executes dropped EXE
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\541JN.exe"C:\Users\Admin\AppData\Local\Temp\541JN.exe"40⤵
- Executes dropped EXE
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\8NBB7.exe"C:\Users\Admin\AppData\Local\Temp\8NBB7.exe"41⤵
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\XTUMA.exe"C:\Users\Admin\AppData\Local\Temp\XTUMA.exe"42⤵
- Executes dropped EXE
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\447N2.exe"C:\Users\Admin\AppData\Local\Temp\447N2.exe"43⤵
- Executes dropped EXE
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Q8W19.exe"C:\Users\Admin\AppData\Local\Temp\Q8W19.exe"44⤵
- Executes dropped EXE
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\N339N.exe"C:\Users\Admin\AppData\Local\Temp\N339N.exe"45⤵
- Executes dropped EXE
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\PH0L8.exe"C:\Users\Admin\AppData\Local\Temp\PH0L8.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:804 -
C:\Users\Admin\AppData\Local\Temp\3X417.exe"C:\Users\Admin\AppData\Local\Temp\3X417.exe"47⤵
- Executes dropped EXE
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\C5CDN.exe"C:\Users\Admin\AppData\Local\Temp\C5CDN.exe"48⤵
- Executes dropped EXE
PID:872 -
C:\Users\Admin\AppData\Local\Temp\79B41.exe"C:\Users\Admin\AppData\Local\Temp\79B41.exe"49⤵
- Executes dropped EXE
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\7ZD2N.exe"C:\Users\Admin\AppData\Local\Temp\7ZD2N.exe"50⤵
- Executes dropped EXE
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\O8OYX.exe"C:\Users\Admin\AppData\Local\Temp\O8OYX.exe"51⤵
- Executes dropped EXE
PID:940 -
C:\Users\Admin\AppData\Local\Temp\17ER8.exe"C:\Users\Admin\AppData\Local\Temp\17ER8.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:892 -
C:\Users\Admin\AppData\Local\Temp\8VEIN.exe"C:\Users\Admin\AppData\Local\Temp\8VEIN.exe"53⤵
- Executes dropped EXE
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\G9U6C.exe"C:\Users\Admin\AppData\Local\Temp\G9U6C.exe"54⤵
- Executes dropped EXE
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\OB5S7.exe"C:\Users\Admin\AppData\Local\Temp\OB5S7.exe"55⤵
- Executes dropped EXE
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\W03C6.exe"C:\Users\Admin\AppData\Local\Temp\W03C6.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\62QDF.exe"C:\Users\Admin\AppData\Local\Temp\62QDF.exe"57⤵
- Executes dropped EXE
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\327I8.exe"C:\Users\Admin\AppData\Local\Temp\327I8.exe"58⤵
- Executes dropped EXE
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\1F98X.exe"C:\Users\Admin\AppData\Local\Temp\1F98X.exe"59⤵
- Executes dropped EXE
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\R9QB0.exe"C:\Users\Admin\AppData\Local\Temp\R9QB0.exe"60⤵
- Executes dropped EXE
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\VFBC7.exe"C:\Users\Admin\AppData\Local\Temp\VFBC7.exe"61⤵
- Executes dropped EXE
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\MIKEO.exe"C:\Users\Admin\AppData\Local\Temp\MIKEO.exe"62⤵
- Executes dropped EXE
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\2HP02.exe"C:\Users\Admin\AppData\Local\Temp\2HP02.exe"63⤵
- Executes dropped EXE
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\1QDUP.exe"C:\Users\Admin\AppData\Local\Temp\1QDUP.exe"64⤵
- Executes dropped EXE
PID:844 -
C:\Users\Admin\AppData\Local\Temp\822D4.exe"C:\Users\Admin\AppData\Local\Temp\822D4.exe"65⤵
- Executes dropped EXE
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\3516P.exe"C:\Users\Admin\AppData\Local\Temp\3516P.exe"66⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\WLMFO.exe"C:\Users\Admin\AppData\Local\Temp\WLMFO.exe"67⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\I8P9I.exe"C:\Users\Admin\AppData\Local\Temp\I8P9I.exe"68⤵PID:1464
-
C:\Users\Admin\AppData\Local\Temp\4685U.exe"C:\Users\Admin\AppData\Local\Temp\4685U.exe"69⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\B4ZW2.exe"C:\Users\Admin\AppData\Local\Temp\B4ZW2.exe"70⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\95PIY.exe"C:\Users\Admin\AppData\Local\Temp\95PIY.exe"71⤵
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\64J95.exe"C:\Users\Admin\AppData\Local\Temp\64J95.exe"72⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\74609.exe"C:\Users\Admin\AppData\Local\Temp\74609.exe"73⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\WNZFG.exe"C:\Users\Admin\AppData\Local\Temp\WNZFG.exe"74⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\F5ZE9.exe"C:\Users\Admin\AppData\Local\Temp\F5ZE9.exe"75⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\5R1QC.exe"C:\Users\Admin\AppData\Local\Temp\5R1QC.exe"76⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\CL56F.exe"C:\Users\Admin\AppData\Local\Temp\CL56F.exe"77⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\62983.exe"C:\Users\Admin\AppData\Local\Temp\62983.exe"78⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\6N2CB.exe"C:\Users\Admin\AppData\Local\Temp\6N2CB.exe"79⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\5SH28.exe"C:\Users\Admin\AppData\Local\Temp\5SH28.exe"80⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\U7770.exe"C:\Users\Admin\AppData\Local\Temp\U7770.exe"81⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\IHX4Z.exe"C:\Users\Admin\AppData\Local\Temp\IHX4Z.exe"82⤵
- System Location Discovery: System Language Discovery
PID:940 -
C:\Users\Admin\AppData\Local\Temp\Z9T17.exe"C:\Users\Admin\AppData\Local\Temp\Z9T17.exe"83⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\1BL2V.exe"C:\Users\Admin\AppData\Local\Temp\1BL2V.exe"84⤵
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\RI9VF.exe"C:\Users\Admin\AppData\Local\Temp\RI9VF.exe"85⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\1R49T.exe"C:\Users\Admin\AppData\Local\Temp\1R49T.exe"86⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\AN1MJ.exe"C:\Users\Admin\AppData\Local\Temp\AN1MJ.exe"87⤵
- System Location Discovery: System Language Discovery
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\L9894.exe"C:\Users\Admin\AppData\Local\Temp\L9894.exe"88⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\KS883.exe"C:\Users\Admin\AppData\Local\Temp\KS883.exe"89⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\V8R5I.exe"C:\Users\Admin\AppData\Local\Temp\V8R5I.exe"90⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\64ZP0.exe"C:\Users\Admin\AppData\Local\Temp\64ZP0.exe"91⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\6AX24.exe"C:\Users\Admin\AppData\Local\Temp\6AX24.exe"92⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\J9Q76.exe"C:\Users\Admin\AppData\Local\Temp\J9Q76.exe"93⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\06EXK.exe"C:\Users\Admin\AppData\Local\Temp\06EXK.exe"94⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\Q6P2L.exe"C:\Users\Admin\AppData\Local\Temp\Q6P2L.exe"95⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\LDMHZ.exe"C:\Users\Admin\AppData\Local\Temp\LDMHZ.exe"96⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\IE9QM.exe"C:\Users\Admin\AppData\Local\Temp\IE9QM.exe"97⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\ON4U3.exe"C:\Users\Admin\AppData\Local\Temp\ON4U3.exe"98⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\KJ43K.exe"C:\Users\Admin\AppData\Local\Temp\KJ43K.exe"99⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\PS997.exe"C:\Users\Admin\AppData\Local\Temp\PS997.exe"100⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\57TSW.exe"C:\Users\Admin\AppData\Local\Temp\57TSW.exe"101⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\Z1683.exe"C:\Users\Admin\AppData\Local\Temp\Z1683.exe"102⤵PID:2140
-
C:\Users\Admin\AppData\Local\Temp\9VV86.exe"C:\Users\Admin\AppData\Local\Temp\9VV86.exe"103⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\B61ZU.exe"C:\Users\Admin\AppData\Local\Temp\B61ZU.exe"104⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\J4A71.exe"C:\Users\Admin\AppData\Local\Temp\J4A71.exe"105⤵PID:2352
-
C:\Users\Admin\AppData\Local\Temp\D94LU.exe"C:\Users\Admin\AppData\Local\Temp\D94LU.exe"106⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\D962E.exe"C:\Users\Admin\AppData\Local\Temp\D962E.exe"107⤵PID:1352
-
C:\Users\Admin\AppData\Local\Temp\8K5F0.exe"C:\Users\Admin\AppData\Local\Temp\8K5F0.exe"108⤵PID:2216
-
C:\Users\Admin\AppData\Local\Temp\ZAEM0.exe"C:\Users\Admin\AppData\Local\Temp\ZAEM0.exe"109⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\UOOQ5.exe"C:\Users\Admin\AppData\Local\Temp\UOOQ5.exe"110⤵PID:356
-
C:\Users\Admin\AppData\Local\Temp\8TN19.exe"C:\Users\Admin\AppData\Local\Temp\8TN19.exe"111⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\6H33E.exe"C:\Users\Admin\AppData\Local\Temp\6H33E.exe"112⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\3RJR1.exe"C:\Users\Admin\AppData\Local\Temp\3RJR1.exe"113⤵PID:940
-
C:\Users\Admin\AppData\Local\Temp\JK22D.exe"C:\Users\Admin\AppData\Local\Temp\JK22D.exe"114⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\E9560.exe"C:\Users\Admin\AppData\Local\Temp\E9560.exe"115⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\25JIM.exe"C:\Users\Admin\AppData\Local\Temp\25JIM.exe"116⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\983JG.exe"C:\Users\Admin\AppData\Local\Temp\983JG.exe"117⤵
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\K9EC7.exe"C:\Users\Admin\AppData\Local\Temp\K9EC7.exe"118⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\4TJUB.exe"C:\Users\Admin\AppData\Local\Temp\4TJUB.exe"119⤵PID:2828
-
C:\Users\Admin\AppData\Local\Temp\21060.exe"C:\Users\Admin\AppData\Local\Temp\21060.exe"120⤵
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\0IZ59.exe"C:\Users\Admin\AppData\Local\Temp\0IZ59.exe"121⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\RW215.exe"C:\Users\Admin\AppData\Local\Temp\RW215.exe"122⤵PID:1164
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-