Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe
Resource
win10v2004-20241007-en
General
-
Target
8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe
-
Size
56KB
-
MD5
cca34c9d021e1f5078fe708e8f819ee0
-
SHA1
ffd9c7f917d17d0bc8f5fa89937a5536740e1eba
-
SHA256
8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9
-
SHA512
600a25f2299cd6c673e1bf3d89fa4b78ff173ec1853d01b8795a7533997c9ae58eb744be1f53e5a6c5d8cc540112adc840c9bdae46ee3d202e8ed83c736c199c
-
SSDEEP
768:uEaz5G7MaEtbwQpeyjaSLyfOPT4xcsrRA9Xu/IC4X3i2AH350azknSRXJuRWQlhd:v4GYUWeypTUuuQj635cSRU3iN/ntNm
Malware Config
Signatures
-
Drops startup file 64 IoCs
Processes:
8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk 8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\TA_Start.lnk dwdsrngt.exe -
Executes dropped EXE 64 IoCs
Processes:
dwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exepid process 2408 dwdsrngt.exe 2624 dwdsrngt.exe 2820 dwdsrngt.exe 2544 dwdsrngt.exe 2740 dwdsrngt.exe 2596 dwdsrngt.exe 2044 dwdsrngt.exe 2060 dwdsrngt.exe 2580 dwdsrngt.exe 2860 dwdsrngt.exe 1308 dwdsrngt.exe 3064 dwdsrngt.exe 2496 dwdsrngt.exe 836 dwdsrngt.exe 2392 dwdsrngt.exe 2176 dwdsrngt.exe 2288 dwdsrngt.exe 2376 dwdsrngt.exe 2136 dwdsrngt.exe 2908 dwdsrngt.exe 1608 dwdsrngt.exe 2124 dwdsrngt.exe 936 dwdsrngt.exe 964 dwdsrngt.exe 1832 dwdsrngt.exe 1436 dwdsrngt.exe 620 dwdsrngt.exe 1856 dwdsrngt.exe 1388 dwdsrngt.exe 2064 dwdsrngt.exe 680 dwdsrngt.exe 2304 dwdsrngt.exe 876 dwdsrngt.exe 1692 dwdsrngt.exe 1704 dwdsrngt.exe 2256 dwdsrngt.exe 2716 dwdsrngt.exe 2744 dwdsrngt.exe 2804 dwdsrngt.exe 2980 dwdsrngt.exe 2904 dwdsrngt.exe 2752 dwdsrngt.exe 2568 dwdsrngt.exe 2592 dwdsrngt.exe 1676 dwdsrngt.exe 2792 dwdsrngt.exe 2224 dwdsrngt.exe 340 dwdsrngt.exe 2780 dwdsrngt.exe 1992 dwdsrngt.exe 2856 dwdsrngt.exe 2864 dwdsrngt.exe 3040 dwdsrngt.exe 2396 dwdsrngt.exe 352 dwdsrngt.exe 836 dwdsrngt.exe 2096 dwdsrngt.exe 2156 dwdsrngt.exe 2800 dwdsrngt.exe 2376 dwdsrngt.exe 1256 dwdsrngt.exe 2488 dwdsrngt.exe 684 dwdsrngt.exe 1284 dwdsrngt.exe -
Loads dropped DLL 64 IoCs
Processes:
8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exepid process 1504 8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe 1504 8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe 2408 dwdsrngt.exe 2408 dwdsrngt.exe 2624 dwdsrngt.exe 2624 dwdsrngt.exe 2820 dwdsrngt.exe 2820 dwdsrngt.exe 2544 dwdsrngt.exe 2544 dwdsrngt.exe 2740 dwdsrngt.exe 2740 dwdsrngt.exe 2596 dwdsrngt.exe 2596 dwdsrngt.exe 2044 dwdsrngt.exe 2044 dwdsrngt.exe 2060 dwdsrngt.exe 2060 dwdsrngt.exe 2580 dwdsrngt.exe 2580 dwdsrngt.exe 2860 dwdsrngt.exe 2860 dwdsrngt.exe 1308 dwdsrngt.exe 1308 dwdsrngt.exe 3064 dwdsrngt.exe 3064 dwdsrngt.exe 2496 dwdsrngt.exe 2496 dwdsrngt.exe 836 dwdsrngt.exe 836 dwdsrngt.exe 2392 dwdsrngt.exe 2392 dwdsrngt.exe 2176 dwdsrngt.exe 2176 dwdsrngt.exe 2288 dwdsrngt.exe 2288 dwdsrngt.exe 2376 dwdsrngt.exe 2376 dwdsrngt.exe 2136 dwdsrngt.exe 2136 dwdsrngt.exe 2908 dwdsrngt.exe 2908 dwdsrngt.exe 1608 dwdsrngt.exe 1608 dwdsrngt.exe 2124 dwdsrngt.exe 2124 dwdsrngt.exe 936 dwdsrngt.exe 936 dwdsrngt.exe 964 dwdsrngt.exe 964 dwdsrngt.exe 1832 dwdsrngt.exe 1832 dwdsrngt.exe 1436 dwdsrngt.exe 1436 dwdsrngt.exe 620 dwdsrngt.exe 620 dwdsrngt.exe 1856 dwdsrngt.exe 1856 dwdsrngt.exe 1388 dwdsrngt.exe 1388 dwdsrngt.exe 2064 dwdsrngt.exe 2064 dwdsrngt.exe 680 dwdsrngt.exe 680 dwdsrngt.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
dwdsrngt.exe8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\{0E-E6-6E-EA-ZN} = "c:\\windows\\SysWOW64\\dwdsrngt.exe CHD001" dwdsrngt.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\{0E-E6-6E-EA-ZN} = "C:\\Users\\Admin\\AppData\\Local\\Temp\\8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe CHD001" 8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe -
Drops file in System32 directory 64 IoCs
Processes:
dwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exe8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedescription ioc process File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File created \??\c:\windows\SysWOW64\dwdsrngt.exe 8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification \??\c:\windows\SysWOW64\dwdsrngt.exe 8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe File opened for modification C:\Windows\SysWOW64\dbglogfolder\n_inst_26_11_24.log dwdsrngt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
dwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exe8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwdsrngt.exe -
Modifies registry class 64 IoCs
Processes:
dwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exe8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm 8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.htm dwdsrngt.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
Processes:
8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exepid process 1504 8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe 1504 8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe 2408 dwdsrngt.exe 2408 dwdsrngt.exe 2624 dwdsrngt.exe 2624 dwdsrngt.exe 2820 dwdsrngt.exe 2820 dwdsrngt.exe 2544 dwdsrngt.exe 2544 dwdsrngt.exe 2740 dwdsrngt.exe 2740 dwdsrngt.exe 2596 dwdsrngt.exe 2596 dwdsrngt.exe 2044 dwdsrngt.exe 2044 dwdsrngt.exe 2060 dwdsrngt.exe 2060 dwdsrngt.exe 2580 dwdsrngt.exe 2580 dwdsrngt.exe 2860 dwdsrngt.exe 2860 dwdsrngt.exe 1308 dwdsrngt.exe 1308 dwdsrngt.exe 3064 dwdsrngt.exe 3064 dwdsrngt.exe 2496 dwdsrngt.exe 2496 dwdsrngt.exe 836 dwdsrngt.exe 836 dwdsrngt.exe 2392 dwdsrngt.exe 2392 dwdsrngt.exe 2176 dwdsrngt.exe 2176 dwdsrngt.exe 2288 dwdsrngt.exe 2288 dwdsrngt.exe 2376 dwdsrngt.exe 2376 dwdsrngt.exe 2136 dwdsrngt.exe 2136 dwdsrngt.exe 2908 dwdsrngt.exe 2908 dwdsrngt.exe 1608 dwdsrngt.exe 1608 dwdsrngt.exe 2124 dwdsrngt.exe 2124 dwdsrngt.exe 936 dwdsrngt.exe 936 dwdsrngt.exe 964 dwdsrngt.exe 964 dwdsrngt.exe 1832 dwdsrngt.exe 1832 dwdsrngt.exe 1436 dwdsrngt.exe 1436 dwdsrngt.exe 620 dwdsrngt.exe 620 dwdsrngt.exe 1856 dwdsrngt.exe 1856 dwdsrngt.exe 1388 dwdsrngt.exe 1388 dwdsrngt.exe 2064 dwdsrngt.exe 2064 dwdsrngt.exe 680 dwdsrngt.exe 680 dwdsrngt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedwdsrngt.exedescription pid process target process PID 1504 wrote to memory of 2408 1504 8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe dwdsrngt.exe PID 1504 wrote to memory of 2408 1504 8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe dwdsrngt.exe PID 1504 wrote to memory of 2408 1504 8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe dwdsrngt.exe PID 1504 wrote to memory of 2408 1504 8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe dwdsrngt.exe PID 2408 wrote to memory of 2624 2408 dwdsrngt.exe dwdsrngt.exe PID 2408 wrote to memory of 2624 2408 dwdsrngt.exe dwdsrngt.exe PID 2408 wrote to memory of 2624 2408 dwdsrngt.exe dwdsrngt.exe PID 2408 wrote to memory of 2624 2408 dwdsrngt.exe dwdsrngt.exe PID 2624 wrote to memory of 2820 2624 dwdsrngt.exe dwdsrngt.exe PID 2624 wrote to memory of 2820 2624 dwdsrngt.exe dwdsrngt.exe PID 2624 wrote to memory of 2820 2624 dwdsrngt.exe dwdsrngt.exe PID 2624 wrote to memory of 2820 2624 dwdsrngt.exe dwdsrngt.exe PID 2820 wrote to memory of 2544 2820 dwdsrngt.exe dwdsrngt.exe PID 2820 wrote to memory of 2544 2820 dwdsrngt.exe dwdsrngt.exe PID 2820 wrote to memory of 2544 2820 dwdsrngt.exe dwdsrngt.exe PID 2820 wrote to memory of 2544 2820 dwdsrngt.exe dwdsrngt.exe PID 2544 wrote to memory of 2740 2544 dwdsrngt.exe dwdsrngt.exe PID 2544 wrote to memory of 2740 2544 dwdsrngt.exe dwdsrngt.exe PID 2544 wrote to memory of 2740 2544 dwdsrngt.exe dwdsrngt.exe PID 2544 wrote to memory of 2740 2544 dwdsrngt.exe dwdsrngt.exe PID 2740 wrote to memory of 2596 2740 dwdsrngt.exe dwdsrngt.exe PID 2740 wrote to memory of 2596 2740 dwdsrngt.exe dwdsrngt.exe PID 2740 wrote to memory of 2596 2740 dwdsrngt.exe dwdsrngt.exe PID 2740 wrote to memory of 2596 2740 dwdsrngt.exe dwdsrngt.exe PID 2596 wrote to memory of 2044 2596 dwdsrngt.exe dwdsrngt.exe PID 2596 wrote to memory of 2044 2596 dwdsrngt.exe dwdsrngt.exe PID 2596 wrote to memory of 2044 2596 dwdsrngt.exe dwdsrngt.exe PID 2596 wrote to memory of 2044 2596 dwdsrngt.exe dwdsrngt.exe PID 2044 wrote to memory of 2060 2044 dwdsrngt.exe dwdsrngt.exe PID 2044 wrote to memory of 2060 2044 dwdsrngt.exe dwdsrngt.exe PID 2044 wrote to memory of 2060 2044 dwdsrngt.exe dwdsrngt.exe PID 2044 wrote to memory of 2060 2044 dwdsrngt.exe dwdsrngt.exe PID 2060 wrote to memory of 2580 2060 dwdsrngt.exe dwdsrngt.exe PID 2060 wrote to memory of 2580 2060 dwdsrngt.exe dwdsrngt.exe PID 2060 wrote to memory of 2580 2060 dwdsrngt.exe dwdsrngt.exe PID 2060 wrote to memory of 2580 2060 dwdsrngt.exe dwdsrngt.exe PID 2580 wrote to memory of 2860 2580 dwdsrngt.exe dwdsrngt.exe PID 2580 wrote to memory of 2860 2580 dwdsrngt.exe dwdsrngt.exe PID 2580 wrote to memory of 2860 2580 dwdsrngt.exe dwdsrngt.exe PID 2580 wrote to memory of 2860 2580 dwdsrngt.exe dwdsrngt.exe PID 2860 wrote to memory of 1308 2860 dwdsrngt.exe dwdsrngt.exe PID 2860 wrote to memory of 1308 2860 dwdsrngt.exe dwdsrngt.exe PID 2860 wrote to memory of 1308 2860 dwdsrngt.exe dwdsrngt.exe PID 2860 wrote to memory of 1308 2860 dwdsrngt.exe dwdsrngt.exe PID 1308 wrote to memory of 3064 1308 dwdsrngt.exe dwdsrngt.exe PID 1308 wrote to memory of 3064 1308 dwdsrngt.exe dwdsrngt.exe PID 1308 wrote to memory of 3064 1308 dwdsrngt.exe dwdsrngt.exe PID 1308 wrote to memory of 3064 1308 dwdsrngt.exe dwdsrngt.exe PID 3064 wrote to memory of 2496 3064 dwdsrngt.exe dwdsrngt.exe PID 3064 wrote to memory of 2496 3064 dwdsrngt.exe dwdsrngt.exe PID 3064 wrote to memory of 2496 3064 dwdsrngt.exe dwdsrngt.exe PID 3064 wrote to memory of 2496 3064 dwdsrngt.exe dwdsrngt.exe PID 2496 wrote to memory of 836 2496 dwdsrngt.exe dwdsrngt.exe PID 2496 wrote to memory of 836 2496 dwdsrngt.exe dwdsrngt.exe PID 2496 wrote to memory of 836 2496 dwdsrngt.exe dwdsrngt.exe PID 2496 wrote to memory of 836 2496 dwdsrngt.exe dwdsrngt.exe PID 836 wrote to memory of 2392 836 dwdsrngt.exe dwdsrngt.exe PID 836 wrote to memory of 2392 836 dwdsrngt.exe dwdsrngt.exe PID 836 wrote to memory of 2392 836 dwdsrngt.exe dwdsrngt.exe PID 836 wrote to memory of 2392 836 dwdsrngt.exe dwdsrngt.exe PID 2392 wrote to memory of 2176 2392 dwdsrngt.exe dwdsrngt.exe PID 2392 wrote to memory of 2176 2392 dwdsrngt.exe dwdsrngt.exe PID 2392 wrote to memory of 2176 2392 dwdsrngt.exe dwdsrngt.exe PID 2392 wrote to memory of 2176 2392 dwdsrngt.exe dwdsrngt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe"C:\Users\Admin\AppData\Local\Temp\8fcc76b2ce9751b9c2dae8c96e9d6d0f5a8585decb3700d256772b75a8eff0b9.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1504 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD0012⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD0013⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD0014⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD0015⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD0016⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD0017⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD0018⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD0019⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2060 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00110⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00111⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00112⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00113⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00114⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00115⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00116⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00117⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2176 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00118⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2288 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00119⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2376 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00120⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2136 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00121⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2908 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00122⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1608 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00123⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2124 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00124⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:936 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00125⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:964 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00126⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1832 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00127⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1436 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00128⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:620 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00129⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1856 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00130⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1388 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00131⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2064 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00132⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:680 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00133⤵
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2304 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00134⤵
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
PID:876 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00135⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1692 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00136⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1704 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00137⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2256 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00138⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2716 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00139⤵
- Executes dropped EXE
PID:2744 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00140⤵
- Executes dropped EXE
- Modifies registry class
PID:2804 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00141⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2980 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00142⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2904 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00143⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2752 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00144⤵
- Executes dropped EXE
- Modifies registry class
PID:2568 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00145⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2592 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00146⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1676 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00147⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2792 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00148⤵
- Drops startup file
- Executes dropped EXE
- Modifies registry class
PID:2224 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00149⤵
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:340 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00150⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2780 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00151⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1992 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00152⤵
- Drops startup file
- Executes dropped EXE
- Modifies registry class
PID:2856 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00153⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2864 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00154⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3040 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00155⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2396 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00156⤵
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:352 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00157⤵
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:836 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00158⤵
- Drops startup file
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2096 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00159⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2156 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00160⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2800 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00161⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2376 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00162⤵
- Executes dropped EXE
- Modifies registry class
PID:1256 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00163⤵
- Drops startup file
- Executes dropped EXE
- Modifies registry class
PID:2488 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00164⤵
- Drops startup file
- Executes dropped EXE
PID:684 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00165⤵
- Drops startup file
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1284 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00166⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1660 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00167⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2220 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00168⤵
- Drops startup file
- Drops file in System32 directory
- Modifies registry class
PID:1792 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00169⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:1580 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00170⤵
- Drops startup file
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1632 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00171⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2024 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00172⤵
- Drops startup file
- Modifies registry class
PID:1260 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00173⤵
- Drops startup file
- Modifies registry class
PID:2328 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00174⤵
- Modifies registry class
PID:748 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00175⤵
- Drops startup file
- Drops file in System32 directory
- Modifies registry class
PID:2304 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00176⤵
- Modifies registry class
PID:1592 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00177⤵
- Drops startup file
- Modifies registry class
PID:2832 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00178⤵
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1636 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00179⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2748 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00180⤵
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2828 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00181⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2652 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00182⤵
- Modifies registry class
PID:2552 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00183⤵
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2680 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00184⤵
- Modifies registry class
PID:2564 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00185⤵
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2584 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00186⤵
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3060 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00187⤵
- Drops file in System32 directory
- Modifies registry class
PID:760 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00188⤵
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2044 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00189⤵
- Drops file in System32 directory
- Modifies registry class
PID:2772 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00190⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2764 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00191⤵
- Drops startup file
- Drops file in System32 directory
- Modifies registry class
PID:340 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00192⤵
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2780 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00193⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:300 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00194⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1044 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00195⤵
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2312 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00196⤵
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1144 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00197⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1516 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00198⤵
- Drops startup file
- System Location Discovery: System Language Discovery
PID:2384 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD00199⤵
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2500 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD001100⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2132 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD001101⤵
- Drops startup file
- Modifies registry class
PID:836 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD001102⤵
- Drops file in System32 directory
PID:2096 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD001103⤵
- Drops startup file
- Drops file in System32 directory
PID:1980 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD001104⤵
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2916 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD001105⤵
- Drops startup file
- Drops file in System32 directory
- Modifies registry class
PID:2376 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD001106⤵
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2052 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD001107⤵
- Drops file in System32 directory
- Modifies registry class
PID:1256 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD001108⤵
- Drops startup file
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1840 -
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD001109⤵PID:884
-
\??\c:\windows\SysWOW64\dwdsrngt.exec:\windows\system32\dwdsrngt.exe CHD001110⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2128
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
920B
MD5e696c3808f1c86462e4eeb4ed998cb26
SHA13515d35da3419be4da7b4777cbfe1bfc5f88f5ff
SHA2562e70bf1a6887a55c1f0620fc393619dcd9208bfb764feb7cd5c791a9fe807c07
SHA512052108430d4f203b8711007112c99153505b4ef060e80ffae80e1382f5d5b2fd54539f95d4e72f257366733f9025cd6b8e9385cdc213d521001322d649b3db1c
-
Filesize
56KB
MD521b937135a58d49ebfc5d1a64c7a8ef0
SHA19343b9bf387214c8833ef1310b12c8509f05fef8
SHA256cd14109bf6bf3fc3d2417e8f3f1910976455251df2ae628fbd17f43cac5d264d
SHA512806894bbc7b0809fcfca41f8007bf510704c2230850cae720d6b4b48c94b366740a71668e6e319fb04ee9311c13708a178206f663bb7c943d8ede1be61b56233
-
Filesize
17B
MD5b9b738b5d5b92889336547a6c22d3991
SHA155e7ec0184ac63a182d8973d68a7294d493b75e4
SHA256c327e7bb193088f8afc07ff624422abc3cf7f06bed33b62ba08b443bf306d69f
SHA5125a2879f1aeb783e1b1895cc7a7fc3f752c6a6173581f71062c0c145bf78e560de848294111a1f1ae79e92e96e604ec455af0e69d073a74e9827dcd0fd5489af7