Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
12s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30/09/2024, 13:14
Behavioral task
behavioral1
Sample
0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
0184268ed51034fb5bb309a06c23cc92
-
SHA1
94a52954c57fcca249166ad9d29bbccd91c7f704
-
SHA256
1dc67f1ef244d1092902a9a3a14d570c78c407ea1d22b03c5ed64fea810ab5b0
-
SHA512
9ea7e7154c863ca3138f8bb0de86a8ba07adf83c10876fe5ae796a26e2220e8a8cdd531855c14bc08ba41cb504d4ed5a2a121637441d72e436c377648368426a
-
SSDEEP
24576:Wi8ZjYCw0HTQ5zDAT58ZGftq7AAO3vZpq1U3WgQqPJTRWAl7i7TyCQhkUlDCDoxQ:RMYCwUTQ5/ZGE0Rpj3YO37iK1lWDczju
Malware Config
Signatures
-
Ardamax main executable 2 IoCs
resource yara_rule behavioral1/files/0x0008000000017342-31.dat family_ardamax behavioral1/files/0x0008000000016cf0-46.dat family_ardamax -
Executes dropped EXE 64 IoCs
pid Process 2500 silkroad.exe 2952 silkroad.exe 2772 system32GDHL.exe 316 system32GDHL.exe 2928 Silkroad.exe 2856 Silkroad.exe 2636 system32GDHL.exe 2692 Silkroad.exe 2684 system32GDHL.exe 1296 Silkroad.exe 3048 system32GDHL.exe 944 Silkroad.exe 2992 system32GDHL.exe 3032 Silkroad.exe 3056 Silkroad.exe 1036 system32GDHL.exe 2120 system32GDHL.exe 2400 Silkroad.exe 1768 system32GDHL.exe 2428 Silkroad.exe 560 Silkroad.exe 1212 system32GDHL.exe 2332 system32GDHL.exe 1740 system32GDHL.exe 2108 Silkroad.exe 1656 Silkroad.exe 2260 system32GDHL.exe 2056 Silkroad.exe 2592 system32GDHL.exe 2600 Silkroad.exe 2096 system32GDHL.exe 1608 Silkroad.exe 1600 system32GDHL.exe 1716 Silkroad.exe 2376 system32GDHL.exe 2444 Silkroad.exe 2752 system32GDHL.exe 2940 system32GDHL.exe 2916 Silkroad.exe 2744 Silkroad.exe 3052 system32GDHL.exe 2040 Silkroad.exe 2956 system32GDHL.exe 1692 Silkroad.exe 1552 system32GDHL.exe 1492 Silkroad.exe 2228 system32GDHL.exe 3016 Silkroad.exe 2804 system32GDHL.exe 2964 Silkroad.exe 872 system32GDHL.exe 320 Silkroad.exe 792 system32GDHL.exe 2976 Silkroad.exe 3044 system32GDHL.exe 1092 Silkroad.exe 1984 system32GDHL.exe 2000 Silkroad.exe 700 system32GDHL.exe 1560 system32GDHL.exe 2656 Silkroad.exe 544 Silkroad.exe 2604 system32GDHL.exe 2088 system32GDHL.exe -
Loads dropped DLL 64 IoCs
pid Process 1820 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 1820 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 1820 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 1820 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 2500 silkroad.exe 2952 silkroad.exe 2500 silkroad.exe 2952 silkroad.exe 2928 Silkroad.exe 2856 Silkroad.exe 2856 Silkroad.exe 2692 Silkroad.exe 2928 Silkroad.exe 1296 Silkroad.exe 2692 Silkroad.exe 944 Silkroad.exe 1296 Silkroad.exe 3032 Silkroad.exe 944 Silkroad.exe 3056 Silkroad.exe 3056 Silkroad.exe 3032 Silkroad.exe 2428 Silkroad.exe 2400 Silkroad.exe 2400 Silkroad.exe 560 Silkroad.exe 2428 Silkroad.exe 560 Silkroad.exe 2108 Silkroad.exe 1656 Silkroad.exe 2108 Silkroad.exe 1656 Silkroad.exe 2056 Silkroad.exe 2600 Silkroad.exe 2056 Silkroad.exe 2600 Silkroad.exe 1608 Silkroad.exe 1716 Silkroad.exe 1608 Silkroad.exe 2444 Silkroad.exe 1716 Silkroad.exe 2444 Silkroad.exe 2916 Silkroad.exe 2744 Silkroad.exe 2744 Silkroad.exe 2040 Silkroad.exe 2916 Silkroad.exe 1692 Silkroad.exe 2040 Silkroad.exe 1692 Silkroad.exe 1492 Silkroad.exe 3016 Silkroad.exe 1492 Silkroad.exe 3016 Silkroad.exe 320 Silkroad.exe 2964 Silkroad.exe 320 Silkroad.exe 2976 Silkroad.exe 2964 Silkroad.exe 1092 Silkroad.exe 2976 Silkroad.exe 2000 Silkroad.exe 1092 Silkroad.exe 2000 Silkroad.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\system32GDHL.001 silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File created C:\Windows\system32GDHL.007 Silkroad.exe File opened for modification C:\Windows\system32GDHL.007 Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File opened for modification C:\Windows\system32GDHL.007 Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File opened for modification C:\Windows\system32GDHL.007 Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File opened for modification C:\Windows\system32GDHL.007 Silkroad.exe File opened for modification C:\Windows\system32GDHL.006 Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File opened for modification C:\Windows\system32GDHL.007 Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File opened for modification C:\Windows\system32GDHL.006 Silkroad.exe File opened for modification C:\Windows\system32GDHL.007 Silkroad.exe File opened for modification C:\Windows\system32GDHL.007 Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File opened for modification C:\Windows\system32GDHL.007 Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File opened for modification C:\Windows\system32GDHL.007 Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File opened for modification C:\Windows\system32GDHL.007 Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File created C:\Windows\system32GDHL.007 Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File opened for modification C:\Windows\system32GDHL.007 Silkroad.exe File opened for modification C:\Windows\system32GDHL.exe Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File created C:\Windows\system32GDHL.007 Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File opened for modification C:\Windows\system32GDHL.006 Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File opened for modification C:\Windows\system32GDHL.007 Silkroad.exe File opened for modification C:\Windows\system32GDHL.007 Silkroad.exe File opened for modification C:\Windows\system32GDHL.007 Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File opened for modification C:\Windows\system32GDHL.006 Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 2772 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2772 system32GDHL.exe Token: 33 2684 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2684 system32GDHL.exe Token: 33 1036 system32GDHL.exe Token: SeIncBasePriorityPrivilege 1036 system32GDHL.exe Token: 33 2992 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2992 system32GDHL.exe Token: 33 1212 system32GDHL.exe Token: SeIncBasePriorityPrivilege 1212 system32GDHL.exe Token: 33 2260 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2260 system32GDHL.exe Token: 33 2096 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2096 system32GDHL.exe Token: 33 2752 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2752 system32GDHL.exe Token: 33 3052 system32GDHL.exe Token: SeIncBasePriorityPrivilege 3052 system32GDHL.exe Token: 33 2956 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2956 system32GDHL.exe Token: 33 2804 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2804 system32GDHL.exe Token: 33 3044 system32GDHL.exe Token: SeIncBasePriorityPrivilege 3044 system32GDHL.exe Token: 33 700 system32GDHL.exe Token: SeIncBasePriorityPrivilege 700 system32GDHL.exe Token: 33 2604 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2604 system32GDHL.exe Token: 33 1212 system32GDHL.exe Token: SeIncBasePriorityPrivilege 1212 system32GDHL.exe Token: 33 2564 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2564 system32GDHL.exe Token: 33 2792 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2792 system32GDHL.exe Token: 33 2636 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2636 system32GDHL.exe Token: 33 1804 system32GDHL.exe Token: SeIncBasePriorityPrivilege 1804 system32GDHL.exe Token: 33 2404 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2404 system32GDHL.exe Token: 33 2860 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2860 system32GDHL.exe Token: 33 2256 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2256 system32GDHL.exe Token: 33 1556 system32GDHL.exe Token: SeIncBasePriorityPrivilege 1556 system32GDHL.exe Token: 33 1112 system32GDHL.exe Token: SeIncBasePriorityPrivilege 1112 system32GDHL.exe Token: 33 1952 system32GDHL.exe Token: SeIncBasePriorityPrivilege 1952 system32GDHL.exe Token: 33 2136 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2136 system32GDHL.exe Token: 33 1084 system32GDHL.exe Token: SeIncBasePriorityPrivilege 1084 system32GDHL.exe Token: 33 2320 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2320 system32GDHL.exe Token: 33 2912 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2912 system32GDHL.exe Token: 33 1488 system32GDHL.exe Token: SeIncBasePriorityPrivilege 1488 system32GDHL.exe Token: 33 1144 system32GDHL.exe Token: SeIncBasePriorityPrivilege 1144 system32GDHL.exe Token: 33 2688 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2688 system32GDHL.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2772 system32GDHL.exe 2772 system32GDHL.exe 2772 system32GDHL.exe 2772 system32GDHL.exe 2772 system32GDHL.exe 2684 system32GDHL.exe 2684 system32GDHL.exe 2684 system32GDHL.exe 2684 system32GDHL.exe 2684 system32GDHL.exe 1036 system32GDHL.exe 1036 system32GDHL.exe 1036 system32GDHL.exe 1036 system32GDHL.exe 1036 system32GDHL.exe 2992 system32GDHL.exe 2992 system32GDHL.exe 2992 system32GDHL.exe 2992 system32GDHL.exe 2992 system32GDHL.exe 1212 system32GDHL.exe 1212 system32GDHL.exe 1212 system32GDHL.exe 1212 system32GDHL.exe 1212 system32GDHL.exe 2260 system32GDHL.exe 2260 system32GDHL.exe 2260 system32GDHL.exe 2260 system32GDHL.exe 2260 system32GDHL.exe 2096 system32GDHL.exe 2096 system32GDHL.exe 2096 system32GDHL.exe 2096 system32GDHL.exe 2096 system32GDHL.exe 2752 system32GDHL.exe 2752 system32GDHL.exe 2752 system32GDHL.exe 2752 system32GDHL.exe 2752 system32GDHL.exe 3052 system32GDHL.exe 3052 system32GDHL.exe 3052 system32GDHL.exe 3052 system32GDHL.exe 3052 system32GDHL.exe 2956 system32GDHL.exe 2956 system32GDHL.exe 2956 system32GDHL.exe 2956 system32GDHL.exe 2956 system32GDHL.exe 2804 system32GDHL.exe 2804 system32GDHL.exe 2804 system32GDHL.exe 2804 system32GDHL.exe 2804 system32GDHL.exe 3044 system32GDHL.exe 3044 system32GDHL.exe 3044 system32GDHL.exe 3044 system32GDHL.exe 3044 system32GDHL.exe 700 system32GDHL.exe 700 system32GDHL.exe 700 system32GDHL.exe 700 system32GDHL.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1820 wrote to memory of 2500 1820 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 30 PID 1820 wrote to memory of 2500 1820 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 30 PID 1820 wrote to memory of 2500 1820 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 30 PID 1820 wrote to memory of 2500 1820 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 30 PID 1820 wrote to memory of 2952 1820 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 31 PID 1820 wrote to memory of 2952 1820 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 31 PID 1820 wrote to memory of 2952 1820 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 31 PID 1820 wrote to memory of 2952 1820 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 31 PID 2952 wrote to memory of 316 2952 silkroad.exe 32 PID 2500 wrote to memory of 2772 2500 silkroad.exe 33 PID 2952 wrote to memory of 316 2952 silkroad.exe 32 PID 2500 wrote to memory of 2772 2500 silkroad.exe 33 PID 2952 wrote to memory of 316 2952 silkroad.exe 32 PID 2500 wrote to memory of 2772 2500 silkroad.exe 33 PID 2952 wrote to memory of 316 2952 silkroad.exe 32 PID 2500 wrote to memory of 2772 2500 silkroad.exe 33 PID 2500 wrote to memory of 2856 2500 silkroad.exe 34 PID 2500 wrote to memory of 2856 2500 silkroad.exe 34 PID 2500 wrote to memory of 2856 2500 silkroad.exe 34 PID 2500 wrote to memory of 2856 2500 silkroad.exe 34 PID 2952 wrote to memory of 2928 2952 silkroad.exe 35 PID 2952 wrote to memory of 2928 2952 silkroad.exe 35 PID 2952 wrote to memory of 2928 2952 silkroad.exe 35 PID 2952 wrote to memory of 2928 2952 silkroad.exe 35 PID 2856 wrote to memory of 2636 2856 Silkroad.exe 36 PID 2856 wrote to memory of 2636 2856 Silkroad.exe 36 PID 2856 wrote to memory of 2636 2856 Silkroad.exe 36 PID 2856 wrote to memory of 2636 2856 Silkroad.exe 36 PID 2856 wrote to memory of 2692 2856 Silkroad.exe 37 PID 2856 wrote to memory of 2692 2856 Silkroad.exe 37 PID 2856 wrote to memory of 2692 2856 Silkroad.exe 37 PID 2856 wrote to memory of 2692 2856 Silkroad.exe 37 PID 2928 wrote to memory of 2684 2928 Silkroad.exe 38 PID 2928 wrote to memory of 2684 2928 Silkroad.exe 38 PID 2928 wrote to memory of 2684 2928 Silkroad.exe 38 PID 2928 wrote to memory of 2684 2928 Silkroad.exe 38 PID 2928 wrote to memory of 1296 2928 Silkroad.exe 39 PID 2928 wrote to memory of 1296 2928 Silkroad.exe 39 PID 2928 wrote to memory of 1296 2928 Silkroad.exe 39 PID 2928 wrote to memory of 1296 2928 Silkroad.exe 39 PID 2692 wrote to memory of 3048 2692 Silkroad.exe 117 PID 2692 wrote to memory of 3048 2692 Silkroad.exe 117 PID 2692 wrote to memory of 3048 2692 Silkroad.exe 117 PID 2692 wrote to memory of 3048 2692 Silkroad.exe 117 PID 2692 wrote to memory of 944 2692 Silkroad.exe 41 PID 2692 wrote to memory of 944 2692 Silkroad.exe 41 PID 2692 wrote to memory of 944 2692 Silkroad.exe 41 PID 2692 wrote to memory of 944 2692 Silkroad.exe 41 PID 1296 wrote to memory of 2992 1296 Silkroad.exe 42 PID 1296 wrote to memory of 2992 1296 Silkroad.exe 42 PID 1296 wrote to memory of 2992 1296 Silkroad.exe 42 PID 1296 wrote to memory of 2992 1296 Silkroad.exe 42 PID 1296 wrote to memory of 3032 1296 Silkroad.exe 43 PID 1296 wrote to memory of 3032 1296 Silkroad.exe 43 PID 1296 wrote to memory of 3032 1296 Silkroad.exe 43 PID 1296 wrote to memory of 3032 1296 Silkroad.exe 43 PID 944 wrote to memory of 1036 944 Silkroad.exe 44 PID 944 wrote to memory of 1036 944 Silkroad.exe 44 PID 944 wrote to memory of 1036 944 Silkroad.exe 44 PID 944 wrote to memory of 1036 944 Silkroad.exe 44 PID 944 wrote to memory of 3056 944 Silkroad.exe 167 PID 944 wrote to memory of 3056 944 Silkroad.exe 167 PID 944 wrote to memory of 3056 944 Silkroad.exe 167 PID 944 wrote to memory of 3056 944 Silkroad.exe 167
Processes
-
C:\Users\Admin\AppData\Local\Temp\0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\silkroad.exe"C:\Users\Admin\AppData\Local\Temp\silkroad.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"4⤵
- Executes dropped EXE
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"5⤵
- Executes dropped EXE
PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1036
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3056 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"7⤵
- Executes dropped EXE
PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2400 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:560 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2108 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"10⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2056 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1608 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"12⤵
- Executes dropped EXE
PID:2376
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2444 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"13⤵
- Executes dropped EXE
PID:2940
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2744 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3052
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2040 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"15⤵
- Executes dropped EXE
PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1492 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"16⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2964 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1092 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"18⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:700
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2656 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"19⤵
- Executes dropped EXE
PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"19⤵PID:2152
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"20⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"20⤵
- Drops file in Windows directory
PID:2100 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"21⤵PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"21⤵PID:2560
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"22⤵PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"22⤵
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"23⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"23⤵PID:2752
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"24⤵
- Suspicious use of AdjustPrivilegeToken
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"24⤵PID:2924
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"25⤵PID:2864
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"25⤵
- System Location Discovery: System Language Discovery
PID:2892 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"26⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2404
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"26⤵PID:264
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"27⤵PID:1668
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"27⤵
- Drops file in Windows directory
PID:2284 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"28⤵PID:608
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"28⤵PID:2000
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"29⤵PID:1696
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"29⤵PID:2428
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"30⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1112
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"30⤵PID:2152
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"31⤵PID:1948
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"31⤵PID:2316
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"32⤵PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"32⤵
- Drops file in Windows directory
PID:2776 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"33⤵PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"33⤵
- Drops file in Windows directory
PID:2664 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"34⤵
- Suspicious use of AdjustPrivilegeToken
PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"34⤵PID:2648
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"35⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"35⤵PID:3020
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"36⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"36⤵PID:872
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"37⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"37⤵PID:1028
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"38⤵
- Suspicious use of AdjustPrivilegeToken
PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"38⤵
- Drops file in Windows directory
PID:3056 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"39⤵PID:2968
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"39⤵PID:2400
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"40⤵PID:2336
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"40⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:928 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"41⤵PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"41⤵
- Drops file in Windows directory
PID:2184 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"42⤵PID:1656
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"42⤵PID:1604
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"43⤵
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"43⤵
- Drops file in Windows directory
PID:2852 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"44⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"44⤵PID:316
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"45⤵
- System Location Discovery: System Language Discovery
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"45⤵
- Drops file in Windows directory
PID:2044 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"46⤵
- System Location Discovery: System Language Discovery
PID:1932
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"46⤵PID:3008
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"47⤵
- Adds Run key to start application
PID:2180
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"47⤵PID:872
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"48⤵
- System Location Discovery: System Language Discovery
PID:1292
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"48⤵
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"49⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1916
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"49⤵PID:1996
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"50⤵PID:1740
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"50⤵PID:2488
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"51⤵
- Adds Run key to start application
PID:712
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"51⤵PID:624
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"52⤵
- Adds Run key to start application
PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"52⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:372 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"53⤵PID:2184
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"53⤵PID:2556
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"54⤵PID:2832
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"54⤵
- Drops file in Windows directory
PID:2188 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"55⤵
- System Location Discovery: System Language Discovery
PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"55⤵PID:2640
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"56⤵PID:3036
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"56⤵PID:2232
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"57⤵PID:2868
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"57⤵PID:1692
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"58⤵
- System Location Discovery: System Language Discovery
PID:2912
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"58⤵
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"59⤵
- System Location Discovery: System Language Discovery
PID:1588
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"59⤵PID:1872
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"60⤵
- Adds Run key to start application
PID:960
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"60⤵
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"61⤵PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"61⤵
- System Location Discovery: System Language Discovery
PID:1712 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"62⤵
- Adds Run key to start application
PID:968
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"62⤵PID:572
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"63⤵
- System Location Discovery: System Language Discovery
PID:2056
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"63⤵PID:624
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"64⤵PID:372
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"64⤵
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"65⤵
- Adds Run key to start application
PID:2260
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"65⤵PID:2292
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"66⤵PID:2772
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"66⤵
- Drops file in Windows directory
PID:600 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"67⤵PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"67⤵PID:2636
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"68⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"68⤵PID:2976
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"69⤵PID:1620
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"69⤵
- Drops file in Windows directory
PID:872 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"70⤵PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"70⤵
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"71⤵
- System Location Discovery: System Language Discovery
PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"71⤵PID:2348
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"72⤵PID:1260
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"72⤵PID:2508
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"73⤵PID:2836
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"73⤵PID:1936
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"74⤵PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"74⤵PID:2800
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"75⤵PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"75⤵PID:2956
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"76⤵PID:2924
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"76⤵PID:1392
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"77⤵PID:792
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"77⤵PID:3048
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"78⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"78⤵PID:1036
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"79⤵PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"79⤵PID:2000
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"80⤵PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"80⤵PID:2344
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"81⤵PID:1604
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"81⤵PID:2836
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"82⤵
- Adds Run key to start application
PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"82⤵
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"83⤵PID:2944
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"83⤵
- Drops file in Windows directory
PID:2068 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"84⤵PID:2648
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"84⤵
- Drops file in Windows directory
PID:2900 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"85⤵
- Adds Run key to start application
PID:600
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"85⤵PID:1444
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"86⤵
- Adds Run key to start application
PID:2704
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"86⤵PID:264
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"87⤵PID:964
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"87⤵PID:2572
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"88⤵
- System Location Discovery: System Language Discovery
PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"88⤵PID:1556
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"89⤵PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"89⤵PID:1516
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"90⤵
- Adds Run key to start application
PID:2348
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"90⤵
- Drops file in Windows directory
PID:2136 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"91⤵PID:2564
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"91⤵PID:1936
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"92⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"92⤵
- Drops file in Windows directory
PID:2800 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"93⤵
- Adds Run key to start application
PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"93⤵
- System Location Discovery: System Language Discovery
PID:1484 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"94⤵PID:2804
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"94⤵PID:1040
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"95⤵
- Adds Run key to start application
PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"95⤵PID:2272
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"96⤵PID:3004
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"96⤵PID:2032
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"97⤵PID:960
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"97⤵
- Drops file in Windows directory
PID:1680 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"98⤵
- System Location Discovery: System Language Discovery
PID:1756
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"98⤵PID:2000
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"99⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2484
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"99⤵
- Drops file in Windows directory
PID:1212 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"100⤵PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"100⤵PID:2480
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"101⤵PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"101⤵PID:2828
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"102⤵
- System Location Discovery: System Language Discovery
PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"102⤵PID:2324
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"103⤵
- Adds Run key to start application
PID:1636
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"103⤵PID:2916
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"104⤵PID:2232
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"104⤵PID:880
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"105⤵
- Adds Run key to start application
PID:2180
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"105⤵PID:780
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"106⤵
- System Location Discovery: System Language Discovery
PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"106⤵
- System Location Discovery: System Language Discovery
PID:320 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"107⤵PID:1780
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"107⤵
- Drops file in Windows directory
PID:1812 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"108⤵PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"108⤵PID:1360
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"109⤵
- Adds Run key to start application
PID:2332
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"109⤵PID:2088
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"110⤵PID:2108
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"110⤵PID:700
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"111⤵
- Adds Run key to start application
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"111⤵PID:624
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"112⤵PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"112⤵
- Drops file in Windows directory
PID:1608 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"113⤵PID:2508
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"113⤵PID:2856
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"114⤵
- System Location Discovery: System Language Discovery
PID:2848
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"114⤵
- Drops file in Windows directory
PID:2112 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"115⤵PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"115⤵PID:2240
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"116⤵PID:3020
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"116⤵PID:1296
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"117⤵PID:2976
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"117⤵PID:1292
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"118⤵PID:2032
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"118⤵PID:580
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"119⤵PID:1720
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"119⤵PID:1260
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"120⤵PID:1580
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"120⤵PID:1612
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"121⤵PID:2008
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"121⤵PID:2384
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"122⤵PID:908
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-